<nodes> <node id="672481">  <title><![CDATA[Georgia Tech Presents Satya Nadella With Honorary Degree]]></title>  <uid>36418</uid>  <body><![CDATA[<p lang="EN-US">In recognition of his transformative leadership, Microsoft Chairman and CEO Satya Nadella received an honorary Ph.D. during a ceremony inside the John Lewis Student Center's Atlantic Theater Thursday.&nbsp;</p><p lang="EN-US">It is the most significant honor the Institute bestows on an individual and comes at a time Nadella described as a "golden age" of computer science.&nbsp;&nbsp;</p><p lang="EN-US">"I think what motivates all of us, as this community of folks who are associated with Georgia Tech, is not just the technology, because it's just merely a tool. But&nbsp;it's&nbsp;a powerful means to a more powerful end, which is about empowering every person and every organization on the planet to achieve more. The innovation&nbsp;you're&nbsp;driving here at Georgia Tech comes at one of the most consequential moments in the history of technology. As we enter this age of artificial intelligence, it's communities like this one that will help create the world we want to live in," Nadella said.&nbsp;&nbsp;</p><p lang="EN-US">With over 2,000 Georgia Tech alumni on its staff and a prominent presence in the city of Atlanta, Microsoft recently became the second company in history to surpass a $3 trillion market value. Accepting the degree, Nadella, who became the company's CEO in 2014, spoke of aligning values between Microsoft and Georgia Tech and looking forward to working together to create technologies and solutions for the world's most pressing challenges.&nbsp;&nbsp;</p><p lang="EN-US">"When you talk to Satya, he always leads with the impact that the company is having on people and organizations around the world," Georgia Tech President Ángel Cabrera said during the ceremony. "That sounds awfully familiar with our mission at Georgia Tech — to develop leaders who advance technology and improve the human condition. Our motto is progress and service. We define our success by the impact that we have in the lives of others. So, that explains why we're so excited to bring Satya into the family of Yellow Jackets."&nbsp;</p><p lang="EN-US">A fireside chat between Cabrera and Nadella followed the ceremony. Along with the transformative nature of AI and its ability to improve workflows and productivity in business, Nadella spoke of its potential to bring personalized instruction to students worldwide.&nbsp;&nbsp;</p><p lang="EN-US">He also participated in a roundtable discussion with faculty members about the implementation and impact of AI in higher education, robotics, cybersecurity computing, and other areas. <a href="https://www.cc.gatech.edu/people/alessandro-orso" rel="noreferrer noopener" target="_blank">Alex Orso</a>, interim dean of the College of Computing, was among the participants and discussed ways to foster the exchange of talent between Georgia Tech and Microsoft. He also discussed how Georgia Tech's <a href="https://omscs.gatech.edu/" rel="noreferrer noopener" target="_blank">online computer science master's program</a>, in collaboration with the Division of Lifetime Learning, can serve as a global platform to educate students before, during, and after college.&nbsp;</p><p lang="EN-US"><a href="https://www.cc.gatech.edu/people/irfan-essa" rel="noreferrer noopener" target="_blank">Irfan Essa</a>, senior associate dean in the College of Computing and co-director of Georgia Tech's AI Hub, added that Nadella and the faculty shared ideas for how industry and academia can collaborate to produce a strong workforce in the years to come.&nbsp;&nbsp;</p><p lang="EN-US">"We are a leader in this area and a part of the conversation," he said. "Industry leaders like Microsoft and places like Georgia Tech have to figure out a collaborative system to have more conversations about understanding the future workforce but also learning from companies about what kinds of things we should be providing from a broad standpoint educationally."&nbsp;</p><p lang="EN-US">Nadella then sat down with a group of students, all former Microsoft interns, to discuss their educational experience and what he called a "paradigm shift" across the industry,&nbsp;similar to&nbsp;the rise of the internet and cloud computing.&nbsp;&nbsp;</p><p lang="EN-US">Rynaa Grover will graduate with a master's degree in computer science in May and has accepted a position with Microsoft. "The research that goes on at Georgia Tech is very advanced and in line with the industry.&nbsp;It's&nbsp;incredible to be in this field&nbsp;at this point in time&nbsp;and to be able to contribute to such a big firm;&nbsp;it's&nbsp;really empowering," said Grover, who worked with Microsoft's machine learning platforms as an intern and with large language models in Assistant Professor&nbsp;<a href="https://faculty.cc.gatech.edu/~srijan/" rel="noreferrer noopener" target="_blank">Srijan Kumar</a>’s lab.&nbsp;</p><p lang="EN-US">Yi Qin will also join Microsoft after graduating with a master's in human-computer interaction.&nbsp;&nbsp;</p><p lang="EN-US">"This was such a memorable experience for me,” she said. “Conversations like this make me feel like we&nbsp;are capable of doing&nbsp;a lot of&nbsp;great things. We should capture every opportunity that we have, have a growth mindset, and create whatever impact we want to make."&nbsp;</p>]]></body>  <author>sgagliano3</author>  <status>1</status>  <created>1706219512</created>  <gmt_created>2024-01-25 21:51:52</gmt_created>  <changed>1706282700</changed>  <gmt_changed>2024-01-26 15:25:00</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The honorary Ph.D. is the most significant honor the Institute bestows on an individual.]]></teaser>  <type>news</type>  <sentence><![CDATA[The honorary Ph.D. is the most significant honor the Institute bestows on an individual.]]></sentence>  <summary><![CDATA[<p>The honorary Ph.D. is the most significant honor the Institute bestows on an individual.</p>]]></summary>  <dateline>2024-01-25T00:00:00-05:00</dateline>  <iso_dateline>2024-01-25T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[The honorary Ph.D. is the most significant honor the Institute bestows on an individual.]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[steven.gagliano@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:steven.gagliano@gatech.edu">Steven Gagliano</a> - Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672875</item>          <item>672878</item>          <item>672879</item>      </media>  <hg_media>          <item>          <nid>672875</nid>          <type>image</type>          <title><![CDATA[Microsoft Chairman and CEO Satya Nadella received an honorary Ph.D. during a ceremony inside the John Lewis Student Center's Atlantic Theater Thursday. ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Nadella-GT-Degree-014.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/25/Nadella-GT-Degree-014.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/25/Nadella-GT-Degree-014.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/25/Nadella-GT-Degree-014.jpg?itok=OVKoPD7E]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Microsoft Chairman and CEO Satya Nadella received an honorary Ph.D. during a ceremony inside the John Lewis Student Center's Atlantic Theater Thursday. ]]></image_alt>                    <created>1706221822</created>          <gmt_created>2024-01-25 22:30:22</gmt_created>          <changed>1706222990</changed>          <gmt_changed>2024-01-25 22:49:50</gmt_changed>      </item>          <item>          <nid>672878</nid>          <type>image</type>          <title><![CDATA[Nadella-GT-Degree-008.jpg]]></title>          <body><![CDATA[<p>Microsoft Chairman and CEO Satya Nadella participated in a student roundtable discussion before receiving an honorary Ph.D. from Georgia Tech during a ceremony inside the John Lewis Student Center's Atlantic Theater Thursday. </p>]]></body>                      <image_name><![CDATA[Nadella-GT-Degree-008.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/25/Nadella-GT-Degree-008.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/25/Nadella-GT-Degree-008.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/25/Nadella-GT-Degree-008.jpg?itok=_YC77Ium]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Microsoft Chairman and CEO Satya Nadella participated in a student roundtable discussion before receiving an honorary Ph.D. from Georgia Tech during a ceremony inside the John Lewis Student Center's Atlantic Theater Thursday. ]]></image_alt>                    <created>1706223089</created>          <gmt_created>2024-01-25 22:51:29</gmt_created>          <changed>1706223089</changed>          <gmt_changed>2024-01-25 22:51:29</gmt_changed>      </item>          <item>          <nid>672879</nid>          <type>image</type>          <title><![CDATA[Nadella-GT-Degree-003.jpg]]></title>          <body><![CDATA[<p>Microsoft Chairman and CEO Satya Nadella participated in a faculty roundtable discussion alongside Interim Dean of the College of Computing Alex Orso before receiving an honorary Ph.D. from Georgia Tech during a ceremony inside the John Lewis Student Center's Atlantic Theater Thursday. </p>]]></body>                      <image_name><![CDATA[Nadella-GT-Degree-003.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/25/Nadella-GT-Degree-003.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/25/Nadella-GT-Degree-003.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/25/Nadella-GT-Degree-003.jpg?itok=XbMqomgx]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Microsoft Chairman and CEO Satya Nadella participated in a faculty roundtable discussion alongside the Interim Dean of the College of Computing, Alex Orso, before receiving an honorary Ph.D. from Georgia Tech during a ceremony inside the John Lewis Student Center's Atlantic Theater Thursday. ]]></image_alt>                    <created>1706223182</created>          <gmt_created>2024-01-25 22:53:02</gmt_created>          <changed>1706223182</changed>          <gmt_changed>2024-01-25 22:53:02</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="132"><![CDATA[Institute Leadership]]></category>      </categories>  <news_terms>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="132"><![CDATA[Institute Leadership]]></term>      </news_terms>  <keywords>          <keyword tid="335"><![CDATA[Microsoft]]></keyword>          <keyword tid="13883"><![CDATA[Honorary degree]]></keyword>          <keyword tid="189031"><![CDATA[Georgia Tech President Angel Cabrera]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="672285">  <title><![CDATA[Digital Inspection Portal Uses AI and Machine Vision to Examine Moving Trains]]></title>  <uid>35832</uid>  <body><![CDATA[<div><div><div><div><h3>Collaboration between Norfolk Southern Corporation and the Georgia Tech Research Institute (GTRI) has led to the development of digital train inspection portals that use advanced machine vision and artificial intelligence to examine trains moving at speeds of up to 60 miles per hour to identify mechanical defects that may exist.</h3><p>Machine vision technology in the portals produces images of key components located on the front and back, top, bottom, and sides of train cars, providing a 360-degree view of the complete train. Images produced by the portal are analyzed within minutes of a train’s passage, allowing any issues identified to be reported immediately.</p><div><div><div><div><p>Two train portals are currently in operation on adjacent tracks in Leetonia, Ohio, and the company plans to have as many as a dozen in service by the end of 2024. Among them will be a train portal already under construction near Jackson, Georgia, which is located south of Atlanta.&nbsp;</p><p>“Norfolk Southern is deploying Digital Train Inspection Portals to enhance rail safety across the company’s 22-state network,” said Mabby Amouie, chief data scientist for the company. “The portals feature cutting-edge machine vision inspection technology developed in partnership with GTRI, which engineered the hardware, and Norfolk Southern’s Data Science/Artificial Intelligence and Mechanical teams, which built the brains behind the program.”</p><div><div><div><div><p>The machine vision portion uses 38 high-resolution cameras consisting of a mix of area and line scan cameras to photograph critical components of each rail car moving through the portals. Powerful lights comparable to those used in sports stadiums allow the cameras to take approximately a thousand photographs of each moving rail car.&nbsp;</p><p>“Being able to look at the train while it’s moving at 60 miles per hour provides visibility into defects that would be difficult to see otherwise,” said Gary McMurray, division chief of GTRI’s Intelligent Sustainable Technologies Division. “You want to be able to look at a train while it’s in motion because that’s when components are stressed, and you can see other dynamic faults.”</p><p>To reduce the amount of data that must be analyzed, each camera is aimed at a specific area of the train and takes photographs only when components of interest are visible. “The high-speed cameras are strategically placed at angles to capture things that are difficult to detect with the human eye during stationary inspections,” said Amouie.</p><div><div><div><div><p>Sensors at each portal determine the speed of each train passing through and use that information to precisely control when the photographs are taken.&nbsp;</p><p>“Even with a train traveling 60 miles per hour, we are able to calculate in real time when to tell each camera to take a picture,” said Colin Usher, a GTRI senior research scientist who led development of the machine vision system. “Only images of critical components are taken and the other areas of the train that are inconsequential to identifying defects are not captured. That optimizes the image capture and saves space in the computer system.”&nbsp;</p><p>The images produced by the system are analyzed by artificial intelligence algorithms developed by Norfolk Southern. The algorithms were designed to provide a combination of high accuracy and very low rates of false positives. If defects are spotted, the AI systems reports them immediately.</p><div><div><div><div><p>“The computer transmits the information to Norfolk Southern’s Network Operations Center, where the data is reviewed by subject-matter experts to identify and address issues to proactively ensure the safety of rail operations,” Amouie said. “Critical defects are flagged for immediate handling.”&nbsp;</p><p>The machine vision system uses image compression techniques to reduce the size of the photographs processed by computer servers located in the portals. For a single train, the data analyzed can amount to as much as 500 gigabytes. Because the inspection needs to be done quickly, the image processing is done on-site.&nbsp;</p><p>The inspection portals must operate year-round in all kinds of weather conditions and in geographic locations that range from extreme heat to cold. The machine vision system therefore has to operate despite heavy vibration levels, temperature extremes, rain and snow – and to remain clean as trains pass over.</p><div><div><div><div><p>To protect the cameras, air blown over the camera lenses shields them, while air-conditioned enclosures prevent overheating of the equipment. The system operates in a tunnel structure that helps protect the equipment and control lighting, which must be consistent across the train being inspected.&nbsp;</p><p>The project, which began in 2021, involved approximately a dozen researchers in four GTRI laboratories. The research built on imaging work done earlier for a variety of applications, including the food processing industry, which needed to monitor poultry on moving processing lines.&nbsp;</p><p>“By partnering with GTRI, Norfolk Southern is tapping into the best in machine vision technology in any market,” Amouie said. “We chose GTRI to be a partner because they develop advanced technology solutions and large-scale system prototypes to address the most difficult problems in national security, economic development and the overall human condition.”</p><p>&nbsp;</p><p>Writer: <a href="mailto:john.toon@gtri.gatech.edu">John Toon</a>&nbsp;(john.toon@gtri.gatech.edu)<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>The <a href="https://gtri.gatech.edu">Georgia Tech Research Institute (GTRI)</a> is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.&nbsp;&nbsp;</p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1705677285</created>  <gmt_created>2024-01-19 15:14:45</gmt_created>  <changed>1706276972</changed>  <gmt_changed>2024-01-26 13:49:32</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Norfolk Southern Corporation and the Georgia Tech Research Institute (GTRI) have developed digital train inspection portals that use advanced machine vision and artificial intelligence to identify mechanical defects that may exist on moving trains.]]></teaser>  <type>news</type>  <sentence><![CDATA[Norfolk Southern Corporation and the Georgia Tech Research Institute (GTRI) have developed digital train inspection portals that use advanced machine vision and artificial intelligence to identify mechanical defects that may exist on moving trains.]]></sentence>  <summary><![CDATA[<p>Collaboration between Norfolk Southern Corporation and the Georgia Tech Research Institute (GTRI) has led to the development of digital train inspection portals that use advanced machine vision and artificial intelligence to examine trains moving at speeds of up to 60 miles per hour to identify mechanical defects that may exist.</p>]]></summary>  <dateline>2024-01-19T00:00:00-05:00</dateline>  <iso_dateline>2024-01-19T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672809</item>          <item>672808</item>          <item>672810</item>      </media>  <hg_media>          <item>          <nid>672809</nid>          <type>image</type>          <title><![CDATA[Researchers install a high-speed camera ]]></title>          <body><![CDATA[<p>Researchers install a high-speed camera that is part of the portal’s machine vision system. (Credit: John Toon, GTRI)</p>]]></body>                      <image_name><![CDATA[1train-portal12-lg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/19/1train-portal12-lg.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/19/1train-portal12-lg.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/19/1train-portal12-lg.jpg?itok=mJJ27wRA]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers install a high-speed camera ]]></image_alt>                    <created>1705676909</created>          <gmt_created>2024-01-19 15:08:29</gmt_created>          <changed>1705676979</changed>          <gmt_changed>2024-01-19 15:09:39</gmt_changed>      </item>          <item>          <nid>672808</nid>          <type>image</type>          <title><![CDATA[A Norfolk Southern locomotive ]]></title>          <body><![CDATA[<p>A Norfolk Southern locomotive moves through a train portal operating near Leetonia, Ohio. (Credit: Norfolk Southern)</p>]]></body>                      <image_name><![CDATA[IMG_7052.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/19/IMG_7052.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/19/IMG_7052.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/19/IMG_7052.jpg?itok=_YcXUP88]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A Norfolk Southern locomotive ]]></image_alt>                    <created>1705676678</created>          <gmt_created>2024-01-19 15:04:38</gmt_created>          <changed>1705676871</changed>          <gmt_changed>2024-01-19 15:07:51</gmt_changed>      </item>          <item>          <nid>672810</nid>          <type>video</type>          <title><![CDATA[Digital Inspection Portal Uses AI and Machine Vision to Examine Moving Trains]]></title>          <body><![CDATA[<p><span><span>Collaboration between Norfolk Southern Corporation and the Georgia Tech Research Institute (GTRI) has led to the development of digital train inspection portals that use advanced machine vision and artificial intelligence to examine trains moving at speeds of up to 60 miles per hour to identify mechanical defects that may exist.</span></span></p>]]></body>                      <youtube_id><![CDATA[ZEMWWjCRP6M]]></youtube_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <vimeo_id><![CDATA[]]></vimeo_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <video_url><![CDATA[https://www.youtube.com/watch?v=ZEMWWjCRP6M&amp;t=2s]]></video_url>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>                    <created>1705677045</created>          <gmt_created>2024-01-19 15:10:45</gmt_created>          <changed>1705677141</changed>          <gmt_changed>2024-01-19 15:12:21</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="8073"><![CDATA[Norfolk Southern]]></keyword>          <keyword tid="168"><![CDATA[Transportation]]></keyword>          <keyword tid="12698"><![CDATA[Trains]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="7560"><![CDATA[inspection]]></keyword>          <keyword tid="2835"><![CDATA[ai]]></keyword>          <keyword tid="8427"><![CDATA[artificialintelligence]]></keyword>          <keyword tid="193433"><![CDATA[railways]]></keyword>          <keyword tid="167"><![CDATA[Rail]]></keyword>          <keyword tid="193434"><![CDATA[machinevision]]></keyword>          <keyword tid="193435"><![CDATA[nationalsecurity]]></keyword>          <keyword tid="342"><![CDATA[Georgia]]></keyword>      </keywords>  <core_research_areas>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="672473">  <title><![CDATA[The Challenges of Regulating Artificial Intelligence - Cloned]]></title>  <uid>27513</uid>  <body><![CDATA[<p>In 1950, Alan Turing asked, “Can machines think?” More than 70 years later, advancements in artificial intelligence are creating exciting possibilities and questions about its potential pitfalls.&nbsp;&nbsp;</p><p>A recent executive order issued by President Joe Biden seeks to establish "new standards for AI safety and security" while addressing consumer privacy concerns and promoting innovation. Georgia Tech experts have examined the key elements of the order and offer their thoughts on its scope and what comes next.&nbsp;&nbsp;</p><h3>A Precautionary Tale&nbsp;</h3><p>The order calls for the development of standards, tools, and tests to ensure the safe use of AI. From voice scams and phishing campaigns to larger-scale threats, the technology’s potential dangers have been widely documented. But <a href="https://iac.gatech.edu/people/person/margaret-e-kosal" rel="noreferrer noopener" target="_blank">Margaret Kosal</a>, associate professor in the Ivan Allen College of Liberal Arts, says that additional context is often needed to dispel hysteria.&nbsp;</p><p>"No one is going to be hooking up AI to launch nuclear weapons, but AI capabilities may enable targeting, or enable the command and control and the decision-making time to be compressed,” she said. &nbsp;<br />&nbsp;<br />The order will create an AI Safety and Security Board tasked with addressing critical threats. Companies developing foundation models that "pose a serious risk to national security, national economic security, or national public health and safety” will be required to notify the federal government when training the model and required to share the results of all red-team safety tests — a simulated cyberattack to test a system's defenses.&nbsp;&nbsp;</p><p>Since the launch of ChatGPT in 2022, <a href="https://www.cnbc.com/2023/11/28/ai-like-chatgpt-is-creating-huge-increase-in-malicious-phishing-email.html" rel="noreferrer noopener" target="_blank">a CNBC report</a> details a 1,267% rise in phishing emails. <a href="https://faculty.cc.gatech.edu/~srijan/" rel="noreferrer noopener" target="_blank">Srijan Kumar</a>, assistant professor in the College of Computing, attributes the increase to the technology's availability and an inability to rein in "bad actors."&nbsp;&nbsp;</p><p>He says these scams will only continue to get more sophisticated and personalized. They “can be created by knowing what you might be willing to fall prey to versus what I might fall prey to,” said Kumar, whose systems have influenced misinformation detection on sites like X (formerly Twitter) and Wikipedia. “AI is not going to autonomously do all of those bad things, but this order can ensure there are consequences for people who misuse it.”&nbsp;&nbsp;</p><h3>A Delicate Balance&nbsp;</h3><p>Building an AI platform requires large amounts of data regardless of its intended application. Two primary goals of the executive order are protecting privacy and advancing equity.&nbsp;&nbsp;</p><p>To protect personal data, the order tasks Congress with evaluating how agencies collect and use commercially available information and address algorithmic discrimination.&nbsp;&nbsp;</p><p>Acknowledging that everyone should be allowed to have their voice represented in the outputs of AI data sets, <a href="https://www.scheller.gatech.edu/directory/faculty/desai/index.html" rel="noreferrer noopener" target="_blank">Deven Desai,</a> associate professor in the Scheller College of Business, noted, "There are people who don't want to be part of data sets, which is their right, but this means their voices won't be reflected in the outputs.”&nbsp;&nbsp;&nbsp;</p><p>The order also includes sections to address intellectual property concerns among inventors and creators, though legal challenges will likely set new precedents in the years ahead.&nbsp;&nbsp;</p><p>When that time comes, Kosal says that <a href="https://www.nytimes.com/2023/12/27/business/media/new-york-times-open-ai-microsoft-lawsuit.html" rel="noreferrer noopener" target="_blank">defining “theft” in the context of AI becomes the true challenge</a> and that, ultimately, money will play a significant role. "If you spit out a Harry Potter book and read it yourself, nobody will care. It's when you start selling it to make money, and you don't share proceeds with the original people, then it becomes an issue," she said.&nbsp;&nbsp;&nbsp;</p><h3>What Does AI-Generated Mean?&nbsp;</h3><p>The order instructs the Department of Commerce to develop guidelines for content authentication and watermarking to label AI-generated content. Desai questions what it means for something to be truly created by AI.&nbsp;&nbsp;</p><p>An important distinction lies between using AI to assist a writer in organizing their thoughts and using the technology to generate content. He likens the trend to the music industry in the 1980s.&nbsp;&nbsp;</p><p>"Synthesizers really changed people's ability to generate music and, for a while, people thought that was horrible. They can just program the music. They're not. I am still the human responsible for that music, or that article in this case, so what is the point of the label?" he asks.&nbsp;</p><p>As AI assistance becomes commonplace in content creation, trusting the source of information is increasingly important. Recently, articles published on Sports Illustrated's website <a href="https://futurism.com/sports-illustrated-ai-generated-writers">featured AI-generated content</a> provided by a third-party company that had used a machine to write the content and create fake bylines. Sports Illustrated, which may not have known of the problem, ran the material without disclosure to readers. CEO Ross Levinsohn was ousted shortly after the story broke.&nbsp;&nbsp;</p><p>“Perhaps if the third party had disclosed its use of AI software, SI would have been able to assess how much AI was used and then chosen not to run the material, or to run it with a disclaimer that AI helped write the material,” Desai said. "Of course, even if they label the content as AI-generated, a reader still won't know exactly how much of the content came from AI or a human.”&nbsp;</p><h3>AI and the Workforce&nbsp;</h3><p>As AI systems and models become more sophisticated, workers may become more concerned about being replaced. To counteract these concerns, the order calls for a study to examine AI’s potential impact on labor markets and investments in workforce training efforts.&nbsp;&nbsp;</p><p>Kumar compares the rise of AI to similar technological innovations throughout history and sees it as an opportunity for workers and industries to adapt. "It's less a matter of AI replacing workers and more of reskilling people to use the new technology. It's no different from when assembly lines in the auto industry were created."&nbsp;&nbsp;</p><h3>Promoting Innovation and Competition&nbsp;</h3><p>The power to harness the full potential of AI has initiated a race to the top. Desai believes that part of the executive order providing resources to smaller developers can help level the playing field.&nbsp;&nbsp;&nbsp;</p><p>"There is a possibility here for markets to open up. Current players using models that weren't built with transparency in mind might struggle, but maybe that's OK."&nbsp;</p><p>The issue of reliability and transparency comes into focus for Desai, especially as it relates to government usage of AI. The order calls on agencies to "acquire specified AI products and services faster, more cheaply, and more effectively through more rapid and efficient contracting."&nbsp;&nbsp;</p><p>When taxpayer dollars are at stake, government can’t afford to trust a technology it doesn’t fully understand — a topic Desai <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2959472" rel="noreferrer noopener" target="_blank">has explored elsewhere</a>. "You can’t just say, ‘We don’t know how it works, but we trust it.’ That’s not going to work. So that’s where there may be a slowdown in the government’s ability to use private sector software if they can’t explain how the thing works and to show that it doesn’t have discriminatory issues.”&nbsp;</p><h3>What's Next&nbsp;</h3><p>Promoting and policing the safe use of AI cannot be done independently. Georgia Tech experts agree that participation on a global scale is necessary. To that end, the European Union will unveil its comprehensive EU AI Act, which includes a similar framework to the president's executive order.&nbsp;&nbsp;</p><p>Due to the evolving nature of AI, the executive order or the EU's actions will not be all-encompassing. Law often lags behind technology, but Kosal points out that it's crucial to think beyond what currently exists when crafting policy.&nbsp;&nbsp;</p><p>Experts also agree that AI cannot be regulated or governed through a single document and that this order is likely the first in a series of policymaking moves. Kosal sees tremendous opportunity with the innovation surrounding AI but hopes the growing fear of its rise does not usher in another AI winter, in which interest and research funding fade.&nbsp;</p>]]></body>  <author>Walter Rich</author>  <status>1</status>  <created>1706213631</created>  <gmt_created>2024-01-25 20:13:51</gmt_created>  <changed>1706213631</changed>  <gmt_changed>2024-01-25 20:13:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.]]></teaser>  <type>news</type>  <sentence><![CDATA[As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.]]></sentence>  <summary><![CDATA[<p>As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.</p>]]></summary>  <dateline>2024-01-11T00:00:00-05:00</dateline>  <iso_dateline>2024-01-11T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[Steven.gagliano@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:Steven.gagliano@gatech.edu">Steven Gagliano</a> - Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672744</item>      </media>  <hg_media>          <item>          <nid>672744</nid>          <type>image</type>          <title><![CDATA[Artificial Intelligence and Policy]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GettyImages-1191080384.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/11/GettyImages-1191080384.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/11/GettyImages-1191080384.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/11/GettyImages-1191080384.jpg?itok=c0AS8vN8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Artificial Intelligence and Policy]]></image_alt>                    <created>1705003002</created>          <gmt_created>2024-01-11 19:56:42</gmt_created>          <changed>1705003002</changed>          <gmt_changed>2024-01-11 19:56:42</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://news.gatech.edu/ai-am-i]]></url>        <title><![CDATA[AI: Am I...The Future of Artificial Intelligence at Georgia Tech]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="8144"><![CDATA[Georgia Tech Yellow Jackets]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="672295">  <title><![CDATA[GTPD’s Operations Center Answers the Call]]></title>  <uid>36418</uid>  <body><![CDATA[<p>As the voice on the other end of the phone in campus emergencies, the dispatchers at the Georgia Tech Police Department’s (GTPD) Emergency Communications and Operations Center are standing by 24 hours a day, seven days a week.&nbsp;&nbsp;</p><p>Serving as a liaison between the community and responding officers, command center staff monitor calls, emails, and texts from Georgia Tech students, faculty, and staff. They also provide background information on suspects, research license plate numbers and warrants, and monitor the cameras on campus to provide video support for criminal investigations and to ensure officer safety during traffic stops.&nbsp;&nbsp;</p><p>Shireka Graham, director of emergency communications, reminds all members of the Georgia Tech community not to hesitate to reach out to the operations center.&nbsp;&nbsp;</p><p>"We want students, faculty, and staff to know that we are the heartbeat of the operation — they might not see us, but we are here for them,” she said. “We are the voice behind the call, and just like the police officers and other field responders, we're there with them.”&nbsp;</p><p>Sometimes, she noted, people are reluctant to call because they don't think their situation is an emergency or that it's important. “But if they're in doubt, call us and let us get someone out there to evaluate the situation and get them the help they need," Graham said.&nbsp;&nbsp;</p><p>"Our students are our top priority,” she said. “We know there is a lot of pressure” at Tech, especially during finals, “so we encourage our students to call us if they need someone to talk to. We can connect them with the Center for Mental Health Care and Resources, and if they call us, we will send a responder and remain on the line with them until help arrives."&nbsp;</p><p>The operations center can be reached through a 911 call, the LiveSafe app (calls, texts, and audio and video messages), the center's administrative line for non-emergencies (404.894.2500), emergency elevator buttons, and 555 blue light emergency phones across campus. For those reaching out to the command center, Graham said it's important to share as much information as possible to help dispatchers provide the best response.&nbsp;&nbsp;</p><h3>Trained to Assist&nbsp;</h3><p>Before assuming their duties, dispatchers complete a rigorous 12-week training program, and ongoing training is required annually. The law enforcement arm of GTPD earned Commission on Accreditation for Law Enforcement Agencies (CALEA) accreditation in 2013, and Graham challenged her staff with earning the same accreditation — which they accomplished in 2022. The Operations Center is Georgia's only university or college communications center to receive it.&nbsp;</p><p>“Being CALEA-accredited provides the best practices and standards to enhance our commitment to better serve and build trust within the Georgia Tech community,” Graham said. “The intensive process comprises 207 standards and 20-plus annual continued education training hours” for each dispatcher. “It's important to us to provide the highest level of customer service, process each call effectively and efficiently, and assure we're skilled to handle critical incidents regarding our students and the community we serve."&nbsp;&nbsp;&nbsp;</p><p>Working alongside the dispatchers in the command center is a group of student assistants, and giving them an opportunity to see the inner workings of GTPD as video technicians is one of many outreach efforts to connect with the campus community.&nbsp;&nbsp;</p><p>"Who knows the campus better than the students? They're the ones walking it every single day, so having them collaborate with us is very beneficial in meeting our common goal of ensuring safety for our campus," she said.&nbsp;&nbsp;&nbsp;</p><p>In 2022, the team became the first university Public Safety Communications agency in the state to be recognized by the National Center for Missing and Exploited Children's <a href="https://www.missingkids.org/education/training/missing-kids-readiness-program" rel="noreferrer noopener" target="_blank">Missing Kids &amp; 9-1-1 Readiness Program</a>.&nbsp;</p>]]></body>  <author>sgagliano3</author>  <status>1</status>  <created>1705681335</created>  <gmt_created>2024-01-19 16:22:15</gmt_created>  <changed>1706021780</changed>  <gmt_changed>2024-01-23 14:56:20</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The dispatchers inside the Georgia Tech Police Department's Emergency Communications and Operations Center take pride in being the voice behind the call when an emergency arises. ]]></teaser>  <type>news</type>  <sentence><![CDATA[The dispatchers inside the Georgia Tech Police Department's Emergency Communications and Operations Center take pride in being the voice behind the call when an emergency arises. ]]></sentence>  <summary><![CDATA[<p>The dispatchers inside the Georgia Tech Police Department's Emergency Communications and Operations Center take pride in being the voice behind the call when an emergency arises.&nbsp;</p>]]></summary>  <dateline>2024-01-19T00:00:00-05:00</dateline>  <iso_dateline>2024-01-19T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[The dispatchers inside the Georgia Tech Police Department's Emergency Communications and Operations Center take pride in being the voice behind the call when an emergency arises. ]]>  </subtitle>  <sidebar><![CDATA[<p>When placing a wireless 911 call in the area of the GT campus, the call will go directly to the Atlanta 911 Communications Center and transfer to the GTPD Operations Center for assistance.&nbsp;</p>]]></sidebar>  <email><![CDATA[Steven.gagliano@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:Steven.gagliano@gatech.edu">Steven Gagliano</a> - Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672814</item>          <item>672838</item>      </media>  <hg_media>          <item>          <nid>672814</nid>          <type>video</type>          <title><![CDATA[GTPD’s Operations Center Answers the Call]]></title>          <body><![CDATA[<p>The dispatchers inside the Georgia Tech Police Department's Emergency Communications and Operations Center take pride in being the voice behind the call when an emergency arises.</p>]]></body>                      <youtube_id><![CDATA[CKl0ETGl9pw]]></youtube_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <vimeo_id><![CDATA[]]></vimeo_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <video_url><![CDATA[https://www.youtube.com/watch?v=CKl0ETGl9pw]]></video_url>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>                    <created>1705681233</created>          <gmt_created>2024-01-19 16:20:33</gmt_created>          <changed>1705681233</changed>          <gmt_changed>2024-01-19 16:20:33</gmt_changed>      </item>          <item>          <nid>672838</nid>          <type>image</type>          <title><![CDATA[Shireka Graham looks on as a student assistant monitors cameras inside the GTPD Emergency Communications and Operations Center.]]></title>          <body><![CDATA[<p>Shireka Graham looks on as a student assistant monitors cameras inside the GTPD Emergency Communications and Operations Center.</p>]]></body>                      <image_name><![CDATA[Screenshot 2024-01-23 at 9.47.02 AM.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/23/Screenshot%202024-01-23%20at%209.47.02%20AM.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/23/Screenshot%202024-01-23%20at%209.47.02%20AM.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/23/Screenshot%25202024-01-23%2520at%25209.47.02%2520AM.png?itok=sGopw2D4]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Shireka Graham looks on as a student assistant monitors cameras inside the GTPD Emergency Communications and Operations Center.]]></image_alt>                    <created>1706021608</created>          <gmt_created>2024-01-23 14:53:28</gmt_created>          <changed>1706021608</changed>          <gmt_changed>2024-01-23 14:53:28</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="3390"><![CDATA[Georgia Tech Police Department]]></keyword>          <keyword tid="7728"><![CDATA[Georgia Tech community]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="671866">  <title><![CDATA[Improving Mental Health Care, with the Help of an AI Teammate]]></title>  <uid>35599</uid>  <body><![CDATA[<p><span><span><span><span><span><span><span>While increasing numbers of people are seeking mental health care, mental health providers are facing critical shortages. Now, an interdisciplinary team of investigators at Georgia Tech, Emory University, and Penn State aim to develop an interactive AI system that can provide key insights and feedback to help these professionals improve and provide higher quality care, while satisfying the increasing demand for highly trained, effective mental health professionals.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span>A new $2,000,000 grant fr</span></span></span></span></span></span><span><span><span><span><span><span><span>om the National Science Foundation (NSF) will support the research.</span></span></span></span></span></span></span><span><span><span><span><span><span>&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>The research builds on </span></span></span></span></span></span><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1915504&amp;HistoricalAwards=false"><span><span><span><span><span><span><span><span>previous collaboration</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> between </span></span></span></span></span></span><a href="https://www.cc.gatech.edu/people/rosa-arriaga"><span><span><span><span><strong><span><span><span><span>Rosa Arriaga</span></span></span></span></strong></span></span></span></span></a><span><span><span><span><span><span><span>, an associate professor in the </span></span></span></span></span></span></span><a href="https://www.cc.gatech.edu"><span><span><span><span><span><span><span><span><span>College of Computing</span></span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> and </span></span></span></span></span></span><a href="https://med.emory.edu/directory/profile/?u=AMSHERR"><span><span><span><strong><span><span><span><span>Andrew Sherrill</span></span></span></span></strong></span></span></span></a><span><span><span><strong><span><span>,</span></span></strong></span></span></span><span><span><span><span><span><span> an assistant professor in the Department of Psychiatry and Behavioral Sciences at Emory University, who worked together on a computational system for PTSD therapy.&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Arriaga and </span></span></span></span></span></span><a href="https://psychology.gatech.edu/christopher-w-wiese"><span><span><span><span><strong><span><span><span><span>Christopher Wiese</span></span></span></span></strong></span></span></span></span></a><span><span><span><span><span><span><span>, an assistant professor in the </span></span></span></span></span></span></span><a href="https://psychology.gatech.edu"><span><span><span><span><span><span><span><span><span>School of Psychology</span></span></span></span></span></span></span></span></span></a><span><span><span><span><span><span><span> will lead the Georgia Tech team, </span></span></span></span></span></span></span><a href="https://ist.psu.edu/directory/sua425"><span><span><span><span><strong><span><span><span><span>Saeed Abdullah</span></span></span></span></strong></span></span></span></span></a><span><span><span><span><span><span><span>, an assistant professor in the College of Information Sciences and Technology will lead the Penn State team, and </span></span></span></span></span></span></span><span><span><span><span><span><span>Sherrill will serve as overall project lead and Emory team lead.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>The grant, for “</span></span></span></span></span></span><span><span><span><span><span><span><span>Understanding the Ethics, Development, Design, and Integration of Interactive Artificial Intelligence Teammates in Future Mental Health Work</span></span></span></span></span></span></span><span><span><span><span><span><span>” will allocate $801,660 of support to the Georgia Tech team, supporting four years of research.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“The initial three years of our project are dedicated to understanding and defining what functionalities and characteristics make an AI system a 'teammate' rather than just a tool,” Wiese says. “This involves extensive research and interaction with mental health professionals to identify their specific needs and challenges. We aim to understand the nuances of their work, their decision-making processes, and the areas where AI can provide meaningful support.In the final year, we plan to implement a trial run of this AI teammate philosophy with mental health professionals.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>While the project focuses on mental health workers, the impacts of the project range far beyond. </span></span></span></span></span></span></span><span><span><span><span><span><span>“AI is going to fundamentally change the nature of work and workers,” Arriaga says. “And, as such, there’s a significant need for research to develop best practices for integrating worker, work, and future technology.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>The team underscores that sectors like business, education, and customer service could easily apply this research. The ethics protocol the team will develop will also provide a critical framework for best practices. </span></span></span></span></span></span></span><span><span><span><span><span><span>The team also hopes that their findings could inform policymakers and stakeholders making key decisions regarding AI.&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“The knowledge and strategies we develop have the potential to revolutionize how AI is integrated into the broader workforce,” Wiese adds. “We are not just exploring the intersection of human and synthetic intelligence in the mental health profession; we are laying the groundwork for a future where AI and humans collaborate effectively across all areas of work.”</span></span></span></span></span></span></p><h3><span><span><span><span><strong><span><span>Collaborative project</span></span></strong></span></span></span></span></h3><p><span><span><span><span><span><span>The project aims to develop an AI coworker called TEAMMAIT (short for “the Trustworthy, Explainable, and Adaptive Monitoring Machine for AI Team”). Rather than functioning as a tool, as many AI’s currently do, TEAMMAIT will act more as a human teammate would,&nbsp; providing constructive feedback and helping mental healthcare workers develop and learn new skills.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“Unlike conventional AI tools that function as mere utilities, an AI teammate is designed to work collaboratively with humans, adapting to their needs and augmenting their capabilities,” Wiese explains. “Our approach is distinctively human-centric, prioritizing the needs and perspectives of mental health professionals… it’s important to recognize that this is a complex domain and interdisciplinary collaboration is necessary to create the most optimal outcomes when it comes to integrating AI into our lives.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>With both technical and human health aspects to the research, the project will leverage an interdisciplinary team of experts spanning clinical psychology, industrial-organizational psychology, human-computer interaction, and information science.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span>“We need to work closely together to make sure that the system, TEAMMAIT, is useful and usable,” adds Arriaga. “Chris (Wiese) and I are looking at two types of challenges: those associated with the organization, as Chris is an industrial organizational psychology expert — and those associated with the interface, as I am a computer scientist that specializes in human computer interaction.”</span></span></span></span></span></span></p><h3><span><span><span><span><strong><span><span>Long-term timeline</span></span></strong></span></span></span></span></h3><p><span><span><span><span><span><span><span>The project’s long-term timeline reflects the unique challenges that it faces.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span>“A key challenge is in the development and design of the AI tools themselves,” Wiese says. “They need to be user-friendly, adaptable, and efficient, enhancing the capabilities of mental health workers without adding undue complexity or stress. This involves continuous iteration and feedback from end-users to refine the AI tools, ensuring they meet the real-world needs of mental health professionals.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>The team plans to deploy TEAMMAIT in diverse settings in the fourth year of development, and incorporate data from these early users to create development guidelines for Worker-AI teammates in mental health work, and to create ethical guidelines for developing and using this type of system.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span>“This will be a crucial phase where we test the efficacy and integration of the AI in real-world scenarios,” Wiese says. “We will assess not just the functional aspects of the AI, such as how well it performs specific tasks, but also how it impacts the work environment, the well-being of the mental health workers, and ultimately, the quality of care provided to patients.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>Assessing the psychological impacts on workers, including how TEAMMAIT impacts their day-to-day work will be crucial in ensuring TEAMMAIT has a positive impact on healthcare worker’s skills and wellbeing.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span>“We’re interested in understanding how mental health clinicians interact with TEAMMAIT and the subsequent impact on their work,” Wiese adds. “How long does it take for clinicians to become comfortable and proficient with TEAMMAIT? How does their engagement with TEAMMAIT change over the year? Do they feel like they are more effective when using TEAMMAIT? We’re really excited to begin answering these questions.</span></span></span></span></span></span></p><p>&nbsp;</p>]]></body>  <author>sperrin6</author>  <status>1</status>  <created>1704380119</created>  <gmt_created>2024-01-04 14:55:19</gmt_created>  <changed>1705418733</changed>  <gmt_changed>2024-01-16 15:25:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Rather than functioning as a tool, as many AIs currently do, TEAMMAIT will act more as a human teammate would,  providing constructive feedback and helping mental healthcare workers develop and learn new skills]]></teaser>  <type>news</type>  <sentence><![CDATA[Rather than functioning as a tool, as many AIs currently do, TEAMMAIT will act more as a human teammate would,  providing constructive feedback and helping mental healthcare workers develop and learn new skills]]></sentence>  <summary><![CDATA[<p><span><span><span><span><span><span><span>An interdisciplinary team of investigators at Georgia Tech, Emory University, and Penn State aim to develop an interactive AI system that can provide key insights and feedback to help these professionals improve and provide higher quality care, while satisfying the increasing demand for highly trained, effective mental health professionals.</span></span></span></span></span></span></span></p>]]></summary>  <dateline>2024-01-04T00:00:00-05:00</dateline>  <iso_dateline>2024-01-04T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jess.hunt@cos.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Written by Selena Langner</p><p>Contact: Jess Hunt-Ralston</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>643611</item>          <item>672671</item>          <item>672672</item>      </media>  <hg_media>          <item>          <nid>643611</nid>          <type>image</type>          <title><![CDATA[Artificial Intelligence]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[artificial-intelligence-4469138_1280.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/artificial-intelligence-4469138_1280.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/artificial-intelligence-4469138_1280.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/artificial-intelligence-4469138_1280.jpg?itok=D1qcck6C]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Artificial Intelligence]]></image_alt>                    <created>1611926616</created>          <gmt_created>2021-01-29 13:23:36</gmt_created>          <changed>1611926616</changed>          <gmt_changed>2021-01-29 13:23:36</gmt_changed>      </item>          <item>          <nid>672671</nid>          <type>image</type>          <title><![CDATA[Rosa Arriaga]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Rosa_Arriaga.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/04/Rosa_Arriaga.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/04/Rosa_Arriaga.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/04/Rosa_Arriaga.jpeg?itok=41TXWI8_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Photograph of Rosa Arriaga]]></image_alt>                    <created>1704380385</created>          <gmt_created>2024-01-04 14:59:45</gmt_created>          <changed>1704380385</changed>          <gmt_changed>2024-01-04 14:59:45</gmt_changed>      </item>          <item>          <nid>672672</nid>          <type>image</type>          <title><![CDATA[Christopher Wiese]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Wiese.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/04/Wiese.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/04/Wiese.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/04/Wiese.jpeg?itok=Wf9krA43]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Photograph of Christopher Wiese]]></image_alt>                    <created>1704380385</created>          <gmt_created>2024-01-04 14:59:45</gmt_created>          <changed>1704380385</changed>          <gmt_changed>2024-01-04 14:59:45</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="443951"><![CDATA[School of Psychology]]></group>      </groups>  <categories>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>      </categories>  <news_terms>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>      </news_terms>  <keywords>          <keyword tid="192258"><![CDATA[cos-data]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="167710"><![CDATA[School of Psychology]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="672055">  <title><![CDATA[The Challenges of Regulating Artificial Intelligence]]></title>  <uid>36418</uid>  <body><![CDATA[<p>In 1950, Alan Turing asked, “Can machines think?” More than 70 years later, advancements in artificial intelligence are creating exciting possibilities and questions about its potential pitfalls.&nbsp;&nbsp;</p><p>A recent executive order issued by President Joe Biden seeks to establish "new standards for AI safety and security" while addressing consumer privacy concerns and promoting innovation. Georgia Tech experts have examined the key elements of the order and offer their thoughts on its scope and what comes next.&nbsp;&nbsp;</p><h3>A Precautionary Tale&nbsp;</h3><p>The order calls for the development of standards, tools, and tests to ensure the safe use of AI. From voice scams and phishing campaigns to larger-scale threats, the technology’s potential dangers have been widely documented. But <a href="https://iac.gatech.edu/people/person/margaret-e-kosal" rel="noreferrer noopener" target="_blank">Margaret Kosal</a>, associate professor in the Ivan Allen College of Liberal Arts, says that additional context is often needed to dispel hysteria.&nbsp;</p><p>"No one is going to be hooking up AI to launch nuclear weapons, but AI capabilities may enable targeting, or enable the command and control and the decision-making time to be compressed,” she said. &nbsp;<br />&nbsp;<br />The order will create an AI Safety and Security Board tasked with addressing critical threats. Companies developing foundation models that "pose a serious risk to national security, national economic security, or national public health and safety” will be required to notify the federal government when training the model and required to share the results of all red-team safety tests — a simulated cyberattack to test a system's defenses.&nbsp;&nbsp;</p><p>Since the launch of ChatGPT in 2022, <a href="https://www.cnbc.com/2023/11/28/ai-like-chatgpt-is-creating-huge-increase-in-malicious-phishing-email.html" rel="noreferrer noopener" target="_blank">a CNBC report</a> details a 1,267% rise in phishing emails. <a href="https://faculty.cc.gatech.edu/~srijan/" rel="noreferrer noopener" target="_blank">Srijan Kumar</a>, assistant professor in the College of Computing, attributes the increase to the technology's availability and an inability to rein in "bad actors."&nbsp;&nbsp;</p><p>He says these scams will only continue to get more sophisticated and personalized. They “can be created by knowing what you might be willing to fall prey to versus what I might fall prey to,” said Kumar, whose systems have influenced misinformation detection on sites like X (formerly Twitter) and Wikipedia. “AI is not going to autonomously do all of those bad things, but this order can ensure there are consequences for people who misuse it.”&nbsp;&nbsp;</p><h3>A Delicate Balance&nbsp;</h3><p>Building an AI platform requires large amounts of data regardless of its intended application. Two primary goals of the executive order are protecting privacy and advancing equity.&nbsp;&nbsp;</p><p>To protect personal data, the order tasks Congress with evaluating how agencies collect and use commercially available information and address algorithmic discrimination.&nbsp;&nbsp;</p><p>Acknowledging that everyone should be allowed to have their voice represented in the outputs of AI data sets, <a href="https://www.scheller.gatech.edu/directory/faculty/desai/index.html" rel="noreferrer noopener" target="_blank">Deven Desai,</a> associate professor in the Scheller College of Business, noted, "There are people who don't want to be part of data sets, which is their right, but this means their voices won't be reflected in the outputs.”&nbsp;&nbsp;&nbsp;</p><p>The order also includes sections to address intellectual property concerns among inventors and creators, though legal challenges will likely set new precedents in the years ahead.&nbsp;&nbsp;</p><p>When that time comes, Kosal says that <a href="https://www.nytimes.com/2023/12/27/business/media/new-york-times-open-ai-microsoft-lawsuit.html" rel="noreferrer noopener" target="_blank">defining “theft” in the context of AI becomes the true challenge</a> and that, ultimately, money will play a significant role. "If you spit out a Harry Potter book and read it yourself, nobody will care. It's when you start selling it to make money, and you don't share proceeds with the original people, then it becomes an issue," she said.&nbsp;&nbsp;&nbsp;</p><h3>What Does AI-Generated Mean?&nbsp;</h3><p>The order instructs the Department of Commerce to develop guidelines for content authentication and watermarking to label AI-generated content. Desai questions what it means for something to be truly created by AI.&nbsp;&nbsp;</p><p>An important distinction lies between using AI to assist a writer in organizing their thoughts and using the technology to generate content. He likens the trend to the music industry in the 1980s.&nbsp;&nbsp;</p><p>"Synthesizers really changed people's ability to generate music and, for a while, people thought that was horrible. They can just program the music. They're not. I am still the human responsible for that music, or that article in this case, so what is the point of the label?" he asks.&nbsp;</p><p>As AI assistance becomes commonplace in content creation, trusting the source of information is increasingly important. Recently, articles published on Sports Illustrated's website <a href="https://futurism.com/sports-illustrated-ai-generated-writers">featured AI-generated content</a> provided by a third-party company that had used a machine to write the content and create fake bylines. Sports Illustrated, which may not have known of the problem, ran the material without disclosure to readers. CEO Ross Levinsohn was ousted shortly after the story broke.&nbsp;&nbsp;</p><p>“Perhaps if the third party had disclosed its use of AI software, SI would have been able to assess how much AI was used and then chosen not to run the material, or to run it with a disclaimer that AI helped write the material,” Desai said. "Of course, even if they label the content as AI-generated, a reader still won't know exactly how much of the content came from AI or a human.”&nbsp;</p><h3>AI and the Workforce&nbsp;</h3><p>As AI systems and models become more sophisticated, workers may become more concerned about being replaced. To counteract these concerns, the order calls for a study to examine AI’s potential impact on labor markets and investments in workforce training efforts.&nbsp;&nbsp;</p><p>Kumar compares the rise of AI to similar technological innovations throughout history and sees it as an opportunity for workers and industries to adapt. "It's less a matter of AI replacing workers and more of reskilling people to use the new technology. It's no different from when assembly lines in the auto industry were created."&nbsp;&nbsp;</p><h3>Promoting Innovation and Competition&nbsp;</h3><p>The power to harness the full potential of AI has initiated a race to the top. Desai believes that part of the executive order providing resources to smaller developers can help level the playing field.&nbsp;&nbsp;&nbsp;</p><p>"There is a possibility here for markets to open up. Current players using models that weren't built with transparency in mind might struggle, but maybe that's OK."&nbsp;</p><p>The issue of reliability and transparency comes into focus for Desai, especially as it relates to government usage of AI. The order calls on agencies to "acquire specified AI products and services faster, more cheaply, and more effectively through more rapid and efficient contracting."&nbsp;&nbsp;</p><p>When taxpayer dollars are at stake, government can’t afford to trust a technology it doesn’t fully understand — a topic Desai <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2959472" rel="noreferrer noopener" target="_blank">has explored elsewhere</a>. "You can’t just say, ‘We don’t know how it works, but we trust it.’ That’s not going to work. So that’s where there may be a slowdown in the government’s ability to use private sector software if they can’t explain how the thing works and to show that it doesn’t have discriminatory issues.”&nbsp;</p><h3>What's Next&nbsp;</h3><p>Promoting and policing the safe use of AI cannot be done independently. Georgia Tech experts agree that participation on a global scale is necessary. To that end, the European Union will unveil its comprehensive EU AI Act, which includes a similar framework to the president's executive order.&nbsp;&nbsp;</p><p>Due to the evolving nature of AI, the executive order or the EU's actions will not be all-encompassing. Law often lags behind technology, but Kosal points out that it's crucial to think beyond what currently exists when crafting policy.&nbsp;&nbsp;</p><p>Experts also agree that AI cannot be regulated or governed through a single document and that this order is likely the first in a series of policymaking moves. Kosal sees tremendous opportunity with the innovation surrounding AI but hopes the growing fear of its rise does not usher in another AI winter, in which interest and research funding fade.&nbsp;</p>]]></body>  <author>sgagliano3</author>  <status>1</status>  <created>1705001153</created>  <gmt_created>2024-01-11 19:25:53</gmt_created>  <changed>1705071532</changed>  <gmt_changed>2024-01-12 14:58:52</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.]]></teaser>  <type>news</type>  <sentence><![CDATA[As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.]]></sentence>  <summary><![CDATA[<p>As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.</p>]]></summary>  <dateline>2024-01-11T00:00:00-05:00</dateline>  <iso_dateline>2024-01-11T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[As innovation surrounding artificial intelligence continues, Georgia Tech experts offer their thoughts on the scope of the recent executive order and the challenges ahead in regulating AI.]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[Steven.gagliano@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:Steven.gagliano@gatech.edu">Steven Gagliano</a> - Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672744</item>      </media>  <hg_media>          <item>          <nid>672744</nid>          <type>image</type>          <title><![CDATA[Artificial Intelligence and Policy]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GettyImages-1191080384.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/11/GettyImages-1191080384.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/11/GettyImages-1191080384.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/11/GettyImages-1191080384.jpg?itok=c0AS8vN8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Artificial Intelligence and Policy]]></image_alt>                    <created>1705003002</created>          <gmt_created>2024-01-11 19:56:42</gmt_created>          <changed>1705003002</changed>          <gmt_changed>2024-01-11 19:56:42</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://news.gatech.edu/ai-am-i]]></url>        <title><![CDATA[AI: Am I...The Future of Artificial Intelligence at Georgia Tech]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="8144"><![CDATA[Georgia Tech Yellow Jackets]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="672006">  <title><![CDATA[Combining Language and Math for the Greater Good]]></title>  <uid>34973</uid>  <body><![CDATA[<p><span><span>Georgia Tech computer science students and brothers, Christopher and Stephen Linder have been using their math skills and passion for the Russian language to teach Ukrainian refugees through the Tutoring Without Borders program.</span></span></p><p><span><span><a href="https://tutoringwithoutborders.org/"><span>Tutoring Without Borders</span></a><span><span> is an independent platform helping to connect Ukrainian citizens in need of academic help with potential instructors or tutors.</span></span></span></span></p><p><span><span>“The opportunity to work with Tutoring Without Borders has been amazing. It’s been a great way to combine language and math, which are two completely different things, into something very meaningful,” Stephen said.</span></span></p><p><span><span>The first-year students grew up in Marietta, Georgia, and say that Georgia Tech was always their dream school — even though both of their parents went to UGA, <span>which makes for a bit of lighthearted controversy in the family.</span></span></span></p><p><span><span>Christopher and Stephen both came to Tech as math majors but quickly gravitated toward computer science, finding in that discipline an appealing way to use math to solve tangible problems.</span></span></p><p><span><span>The computer science majors first became interested in Russian in high school. Both brothers were learning the violin, and their instructor was Russian. “He would always say little phrases in Russian, and one day our dad jokes and says, ‘Hey, why don’t you study Russian so you can be taught in Russian by your teacher?’” Christopher recalled. </span></span></p><p><span><span>What began as a joke inspired the brothers to enroll in Russian language courses in their first year of high school. They are now thinking about adding a Russian major to their resumes. </span></span></p><p><span><span>The Linders’ love of the Russian language has only deepened, and with the war in Ukraine, they felt compelled to help. “We felt a responsibility to help in some way because of our ability to communicate in Russian,” Stephen said.</span></span></p><p><span><span>Sharing their concerns with their Russian language teacher, they discovered&nbsp; that math tutors are needed in Ukraine. Their teacher introduced them to Tutoring Without Borders, an independent platform connecting Ukrainian citizens with potential tutors.</span></span></p><p><span><span>Since June 2022, Christopher has been tutoring a young woman whose family was forced to move to Hungary. Stephen tutors two siblings who have been displaced to England. Regardless of where students are located, the brothers find time to assist them with their math — and even with their English.</span></span></p><p><span><span>Christopher and Stephen both note the challenges of teaching something technical in a different language, in addition to the emotional toll it can take working with students whose lives have been uprooted. Both continue to be passionate about helping and have no plans to stop anytime soon.</span></span></p><p><span><span><span>“I think just knowing that we can be there to provide some stability is very rewarding. And for me, personally, just getting to learn about my students and learn about their lives is something not many people are able to experience,” Christopher said.</span></span></span></p><p>&nbsp;</p>]]></body>  <author>Evan Atkinson</author>  <status>1</status>  <created>1704902245</created>  <gmt_created>2024-01-10 15:57:25</gmt_created>  <changed>1705003310</changed>  <gmt_changed>2024-01-11 20:01:50</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech computer science students and brothers, Christopher and Stephen Linder have been using the Russian language to tutor Ukrainian refugees in math.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech computer science students and brothers, Christopher and Stephen Linder have been using the Russian language to tutor Ukrainian refugees in math.]]></sentence>  <summary><![CDATA[<p>Georgia Tech computer science students and brothers, Christopher and Stephen Linder have been using the Russian language to teach math to Ukrainian refugees affected by war. The first-year students from Marietta, Georgia, had their interest in the language sparked by their high school violin teacher, who was from Russia. With the outbreak of war in Ukraine, the two felt compelled to help in some way.&nbsp;<a href="https://tutoringwithoutborders.org/">Tutoring Without Borders</a>,&nbsp;an independent platform helping to connect Ukrainian citizens with potential tutors, provided the perfect opportunity for the two to combine their love of math and the Russian language into something meaningful.&nbsp;&nbsp;</p>]]></summary>  <dateline>2024-01-11T00:00:00-05:00</dateline>  <iso_dateline>2024-01-11T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[eatkinson6@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="eatkinson6@gatech.edu">Evan Atkinson,</a> Social Media Manager</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672713</item>          <item>672712</item>          <item>672710</item>      </media>  <hg_media>          <item>          <nid>672713</nid>          <type>image</type>          <title><![CDATA[Christopher and Stephen Linder]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[IMG_5183.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/10/IMG_5183_1.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/10/IMG_5183_1.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/10/IMG_5183_1.jpeg?itok=vf9C4gPL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Christopher and Stephen Linder]]></image_alt>                    <created>1704904193</created>          <gmt_created>2024-01-10 16:29:53</gmt_created>          <changed>1704904193</changed>          <gmt_changed>2024-01-10 16:29:53</gmt_changed>      </item>          <item>          <nid>672712</nid>          <type>image</type>          <title><![CDATA[Christopher and Stephen Linder by Tech Tower]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[IMG_7971.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/10/IMG_7971.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/10/IMG_7971.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/10/IMG_7971.jpg?itok=k-tf878P]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Christopher and Stephen Linder]]></image_alt>                    <created>1704903017</created>          <gmt_created>2024-01-10 16:10:17</gmt_created>          <changed>1704981163</changed>          <gmt_changed>2024-01-11 13:52:43</gmt_changed>      </item>          <item>          <nid>672710</nid>          <type>image</type>          <title><![CDATA[Christopher and Stephen Linder on GT Campus]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[IMG_7984.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/10/IMG_7984.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/10/IMG_7984.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/10/IMG_7984.jpg?itok=438vRPRC]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Christopher and Stephen Linder]]></image_alt>                    <created>1704902957</created>          <gmt_created>2024-01-10 16:09:17</gmt_created>          <changed>1704981145</changed>          <gmt_changed>2024-01-11 13:52:25</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="189777"><![CDATA[Russia-Ukraine conflict]]></keyword>          <keyword tid="1650"><![CDATA[Russia]]></keyword>          <keyword tid="146781"><![CDATA[AP Computer Science]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667408">  <title><![CDATA[The Fundamental Questions: Jesse McDaniel Awarded NSF CAREER Grant for Research Into New Method of Predicting Chemical Reaction Rates, Leveraging Computer Modeling]]></title>  <uid>35599</uid>  <body><![CDATA[<p><span><span><span><span><span><span>Our world is powered by chemical reactions. From new medicines and biotechnology to sustainable energy solutions developing and understanding the chemical reactions behind innovations is a critical first step in pioneering new advances. And a key part of developing new chemistries is discovering how the rates of those chemical reactions can be accelerated or changed.&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>For example, even an everyday chemical reaction, like toasting bread, can substantially change in speed and outcome — by increasing the heat, the speed of the reaction increases, toasting the bread faster. Adding another chemical ingredient — like buttering the bread before frying it — also changes the outcome of the reaction: the bread might brown and crisp rather than toast. The lesson? Certain chemical reactions can be accelerated or changed by adding or altering key variables, and understanding those factors is crucial when trying to create the desired reaction (like avoiding burnt toast!).</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Chemists currently use quantum chemistry techniques to predict the rates and energies of chemical reactions, but the method is limited: predictions can usually only be made for up to a few hundred atoms. In order to scale the predictions to larger systems, and predict the environmental effects of reactions, a new framework needs to be developed.</span></span></span></span></span></span></p><p><a href="https://chemistry.gatech.edu/people/jesse-mcdaniel"><span><span><span><span><span><span><span><span>Jesse McDaniel (School of Chemistry and Biochemistry)</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> is creating that framework by leveraging computer modeling techniques. Now, a new NSF CAREER grant will help him do so. </span></span></span></span></span></span><span><span><span><span><span><span><span>The National Science Foundation Faculty Early Career Development Award is a five-year grant designed to help promising researchers establish a foundation for a lifetime of leadership in their field. Known as CAREER awards, the grants are NSF’s most prestigious funding for untenured assistant professors.&nbsp;</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span>“I am excited about the CAREER research because we are really focusing on fundamental questions that are central to all of chemistry,” McDaniel says</span></span></span></span></span></span><span><span><span><span><span><span><span> about the project.</span></span></span></span></span></span></span></p><h3><br /><span><span><span><strong><span><span>Pioneering a new framework</span></span></strong></span></span></span></h3><p><span><span><span><span><span><span>“Chemical reactions are inherently quantum mechanical in nature,” McDaniel explains. “Electrons rearrange as chemical bonds are broken and formed.” While this type of quantum chemistry can allow scientists to predict the rates and energies of different reactions, these predictions are limited to only tens or hundreds of atoms. That’s where McDaniel’s team comes in. They’re developing modeling techniques based on quantum chemistry that could function over multiple scales, using computer models to scale the predictions. They hope this will help predict environmental effects on chemical reaction rates.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>By developing modeling techniques that can be applied to reactions at multiple scales, McDaniel aims to expand scientist’s ability to predict and model chemical reactions, and how they interact with their environments. “Our goal is to understand the microscopic mechanisms and intermolecular interactions through which chemical reactions are accelerated within unique solvation environments such as microdroplets, thin films, and heterogenous interfaces,” McDaniel says. He hopes that it will allow for computational modeling of chemical reactions in much larger systems.&nbsp;&nbsp;</span></span></span></span></span></span></p><h3><span><span><span><strong><span><span>Interdisciplinary research</span></span></strong></span></span></span></h3><p><span><span><span><span><span><span>As a theoretical and computational chemist, McDaniel’s chemistry experiments don’t take place in a typical chemistry lab — rather, they take place in a computer lab,&nbsp; where Georgia Tech’s robust computer science and software development community functions as a key resource.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“We run computer simulations on high performance computing clusters,” McDaniel explains. “In this regard, we benefit from the HPC infrastructure at Georgia Tech, including the </span></span></span></span></span></span><a href="https://pace.gatech.edu/"><span><span><span><span><span><span><span><span>Partnership for an Advanced Computing Environment (PACE) team</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span>, as well as the computational resources provided in the </span></span></span></span></span></span><a href="https://coda.gatech.edu/"><span><span><span><span><span><span><span><span>new CODA building</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span>.”&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“Software is also a critical part of our research,” he continues. “My colleague </span></span></span></span></span></span><a href="https://www.cc.gatech.edu/people/c-david-sherrill"><span><span><span><span><span><span><span><span>Professor David Sherrill</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> and </span></span></span></span></span></span><a href="http://vergil.chemistry.gatech.edu/"><span><span><span><span><span><span><span><span>his group</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> are lead developers of the Psi4 quantum chemistry software, and this software comprises a core component of our multi-scale modeling efforts.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>In this respect, McDaniel is eager to to involve the next generation of chemists and computer scientists, showcasing the connection between these different fields. McDaniel’s team will partner with regional high school teachers, collaborating to integrate software and data science tools within the high school educational curriculum.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“One thing I like about this project,” McDaniel says, “is that all types of chemists — organic, inorganic, analytical, bio, physical, etc. — care about how chemical reactions happen, and how reactions are influenced by their surroundings.” </span></span></span></span></span></span></p>]]></body>  <author>sperrin6</author>  <status>1</status>  <created>1681837505</created>  <gmt_created>2023-04-18 17:05:05</gmt_created>  <changed>1704919678</changed>  <gmt_changed>2024-01-10 20:47:58</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[By developing modeling techniques that can be applied to reactions at multiple scales, McDaniel aims to expand scientist’s ability to predict and model chemical reactions, and how they interact with their environments.]]></teaser>  <type>news</type>  <sentence><![CDATA[By developing modeling techniques that can be applied to reactions at multiple scales, McDaniel aims to expand scientist’s ability to predict and model chemical reactions, and how they interact with their environments.]]></sentence>  <summary><![CDATA[<p><span><span><span><span><span><span><span><span>School of Chemistry and Biochemistry's</span></span> <span><span>Jesse McDaniel </span></span>is creating a framework to predict chemical reaction rates, leveraging computer modeling techniques. Now, a new NSF CAREER grant will help him do so. “I am excited about the CAREER research because we are really focusing on fundamental questions that are central to all of chemistry,” McDaniel says</span></span></span></span></span></span><span><span><span><span><span><span><span> about the project.</span></span></span></span></span></span></span></p>]]></summary>  <dateline>2023-04-19T00:00:00-04:00</dateline>  <iso_dateline>2023-04-19T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-04-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jess.hunt@cos.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Written by Selena Langner</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670577</item>          <item>672733</item>      </media>  <hg_media>          <item>          <nid>670577</nid>          <type>image</type>          <title><![CDATA[Chemistry Mosaic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Chemistry_Mosaic.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/04/18/Chemistry_Mosaic.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/04/18/Chemistry_Mosaic.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/04/18/Chemistry_Mosaic.png?itok=zNt-9b5b]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[An mosaic-like illustration of chemistry equipment, including flasks and beakers]]></image_alt>                    <created>1681837853</created>          <gmt_created>2023-04-18 17:10:53</gmt_created>          <changed>1681837908</changed>          <gmt_changed>2023-04-18 17:11:48</gmt_changed>      </item>          <item>          <nid>672733</nid>          <type>image</type>          <title><![CDATA[Jesse McDaniel]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Jesse-McDaniel-web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/10/Jesse-McDaniel-web.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/10/Jesse-McDaniel-web.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/10/Jesse-McDaniel-web.jpg?itok=NlJv0eo6]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Jesse McDaniel]]></image_alt>                    <created>1704919628</created>          <gmt_created>2024-01-10 20:47:08</gmt_created>          <changed>1704919655</changed>          <gmt_changed>2024-01-10 20:47:35</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://cos.gatech.edu/news/chemistry-chaos-peptides-and-infinite-problems-georgia-tech-researchers-pioneer-new-frontiers]]></url>        <title><![CDATA[Chemistry, Chaos, Peptides, and (Infinite) Problems: Georgia Tech Researchers Pioneer New Frontiers with NSF CAREER Grants Primary tabs]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/making-medicines-vinayak-agarwal-awarded-nsf-career-grant-peptide-research]]></url>        <title><![CDATA[Making Medicines: Vinayak Agarwal Awarded NSF CAREER Grant for Peptide Research]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/chasing-chaos-alex-blumenthal-awarded-career-grant-research-chaos-fluid-dynamics]]></url>        <title><![CDATA[Chasing Chaos: Alex Blumenthal Awarded CAREER Grant for Research in Chaos, Fluid Dynamics]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/solving-infinite-problems-anton-bernshteyn-awarded-nsf-career-grant-developing-new-unified]]></url>        <title><![CDATA[Solving Infinite Problems: Anton Bernshteyn awarded NSF CAREER grant for developing a new, unified theory of descriptive combinatorics and distributed algorithms]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="85951"><![CDATA[School of Chemistry and Biochemistry]]></group>      </groups>  <categories>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="192249"><![CDATA[cos-community]]></keyword>          <keyword tid="192258"><![CDATA[cos-data]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="671815">  <title><![CDATA[CIPHER Researchers Take Second Place in Southeastern Cyber Cup]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span>Three GTRI researchers made it to the finals and came home with second place in the "</span><a href="https://sites.gatech.edu/cybercup/"><span>Southeastern Cyber Cup"</span></a><span> competition, a multi-day, national-level, higher education competition and cyber hacking event held last month. The three researchers are Justin Hsu, Garrett Brown, and Drew Petry. Their team, named the "Clockcycles," was one of the 15 finalists in the event. Georgia Tech made an impressive mark, with eight teams among the final 15.</span></p><p><span>The Southeastern Cyber Cup is hosted by Georgia Tech’s Office of Information Technology in partnership with Deloitte. The virtual hacking event is open to cybersecurity and IT students and professionals and is held to generate enthusiasm and excitement around cybersecurity careers.&nbsp;</span></p><p><span>As part of the annual competitors are challenged to find a "flag": a string of text. The flags for each challenge are submitted online to receive points. Challenge categories include network, web, crypto, miscellaneous, forensics, and reverse engineering.</span></p><p><span><strong>Why Is the Southeastern Cyber Cup Important for GT/GTRI?</strong></span></p><p><span>The Southeastern Cup and similar competitions are among the many ways that Georgia Tech and GTRI can showcase the skills of its researchers and aid in their professional development. The team’s Southeastern Cyber Cup win also indicates GTRI's role as a leader in the field of cybersecurity.&nbsp;</span></p><p><span>“Historically, CTF (Capture the Flag) competitions are a practical way to sharpen the skills that any cybersecurity researcher/enthusiast may utilize during their career. If you’re interested in cybersecurity, CTFs are a great way to add new tools to your toolbox, as I often find myself picking up new skills during the course of such competitions,” Brown shared.</span></p><p><span>The Clockcycles team undoubtedly got the opportunity to sharpen their skills during the competition. Hsu shared that he and his team “stayed up for at least 20+ hours straight," participating in each event round. The time commitment and dedication certainly paid off in the end!</span></p><p><span><strong>GT/GTRI's Impact on CTF Competitions</strong></span></p><p>GTRI routinely has a group of researchers that participate in CTF competitions. In 2021, Petry and his team had an impressive win at the Hack-a-Sat 2 competition. In 2022, Petry and Hsu traveled to an east coast naval facility as part of a GTRI team that competed in person at an invitation-only event held by the US Navy, "Maritime Militia CTF." Their team was awarded a physical flag to bring back to GTRI, which they hung up as a trophy.</p><p>GTRI's dedication to these competitions hasn't gone unnoticed. At a CTF in 2022, GTRI received a letter of appreciation from the Naval Surface Warfare Center commending their performance. The Clockcyles' win at the Southeastern Cup is just one example of GTRI's impact as a research organization.</p><p><span>Meet the dedicated team members who brought home second place!</span></p><p><span><strong>Justin Hsu</strong></span></p><p><span>Justin Hsu is a Research Scientist in GTRI’S CIPHER (Cybersecurity, Information Protection, and Hardware Evaluation Research) Lab, Software Assurance Branch. Hsu's work includes looking at and working towards developing tools for software security testing and vulnerability analysis/assessments. He received a B.S. in Computer Information Systems from Shorter University, and an M.S. in Computer Science from Georgia Tech. Hsu has spent the majority of his professional career in software development. He previously worked at the ELSYS (Electronic Systems Laboratory) and shared that he moved to CIPHER after attending a seminar that rekindled his interest in cybersecurity.&nbsp;</span></p><p><span>"I’ve been interested in cybersecurity since I was young, probably watching the movie ‘Hackers’ one too many times, and spent the majority of my career doing software development. But after hearing someone talk at a Friday Morning Seminar about their research work on malware, I was reminded of my interest in cybersecurity and wound up making the move from ELSYS to CIPHER," Hsu shared.&nbsp;</span></p><p><span>This was the first year Hsu participated in the Southeastern Cyber Cup, but he has participated in CTFs with fellow CIPHER colleagues since 2021. To date, he's competed in about six different events, including ones sponsored by the U.S. Navy (HACKtheMACHINE, HACKtheMACHINE Unmanned) and the U.S. Air Force/Space Force (Hack-a-Sat, Hack-a-Sat 2, and Hack-a-Sat 3).&nbsp;</span></p><p><span><strong>Drew Petry</strong></span></p><p><span>Drew Petry works as a Research Engineer in the Embedded System Vulnerability Division (ESVD) of CIPHER. Petry’s work focuses on the reverse engineering and security assessment of embedded systems and cyber EW (Electronic Warfare) techniques. He received a B.S. in Computer Engineering from Georgia Tech in 2010. In 2014, he also received his M.S. in Electrical and Computer Engineering from Georgia Tech.</span></p><p><span>Petry has spent the past fourteen years as a professional research engineer at GTRI, working in the embedded system security and vulnerability field. He shared that he’s always been drawn to embedded systems because he "enjoys interacting with low-level hardware and ‘bare-metal’ code.” Bare metal programming is the process of programming directly on the hardware without using an operating system or middleware.</span></p><p><span>Outside of the inaugural Southeastern Cyber Cup competition, Petry competes in capture-the-flag competitions yearly. The events he’s competed in while representing GTRI include the annual U.S. Air/Space Force Hack-a-sat CTFs and the U.S. Navy Hack the Machine cybersecurity competitions.</span></p><p><span><strong>Garrett Brown</strong></span></p><p><span>Garrett Brown is a Research Scientist in the Embedded Cyber Techniques (ECT) branch of the ESVD at CIPHER. He primarily works on vulnerability discovery and analysis of embedded systems. Brown received his B.S. in Computer Science from Georgia Tech.&nbsp;</span></p><p><span>Brown shared that he found his passion in this field after participating in the VIP (Vertically Integrated Project) program while at Georgia Tech as an undergraduate student. During this program, he was a part of the Embedded Systems Cyber Security (ESCS) team, which gave him his "first taste of the work [he] would soon come to love."</span></p><p><span>"I believe cybersecurity practitioners can improve the lives of many around the world, and I'd like to be a part of whatever positive impact we can make," shared Brown when asked why he was passionate about his work.</span></p><p><span>While this was Brown's first time competing in the Southeastern Cyber Cup, he is not a stranger to competitions. He's previously competed in other CTFs as part of the CIPHER team for competitions such as the Hack-a-Sat and HACKtheMACHINE events.</span></p><p><span>When asked how he felt about their team's award, he shared, "I felt both relief and disappointment--relief that I could finally go to sleep and disappointment that we got second place instead of first!”</span></p><p><span>Congratulations Clockcycles team!</span></p><p>&nbsp;</p><p><strong>Writer: Madison McNair (madison.mcnair@gtri.gatech.edu)</strong><span>&nbsp;&nbsp;</span><br /><span><strong>Photographer: Christopher Moore&nbsp;</strong></span><br /><strong>GTRI Communications</strong><span>&nbsp;&nbsp;</span><br /><strong>Georgia Tech Research Institute</strong><span>&nbsp;&nbsp;</span><br /><strong>Atlanta, Georgia</strong></p><p><span>The </span><a href="https://gtri.gatech.edu/" rel="noopener noreferrer" target="_blank"><strong>Georgia Tech Research Institute (GTRI)</strong></a><span> is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940</span><strong> </strong><span>million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</span></p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1704294493</created>  <gmt_created>2024-01-03 15:08:13</gmt_created>  <changed>1704294975</changed>  <gmt_changed>2024-01-03 15:16:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Three GTRI researchers take second place in the Southeastern Cyber Cup, a multi-day, national-level, higher education competition and cyber hacking event, hosted by Georgia Tech’s Office of Information Technology in partnership with Deloitte.]]></teaser>  <type>news</type>  <sentence><![CDATA[Three GTRI researchers take second place in the Southeastern Cyber Cup, a multi-day, national-level, higher education competition and cyber hacking event, hosted by Georgia Tech’s Office of Information Technology in partnership with Deloitte.]]></sentence>  <summary><![CDATA[<p><span>Three GTRI researchers made it to the finals and came home with second place in the "</span><a href="https://sites.gatech.edu/cybercup/"><span>Southeastern Cyber Cup"</span></a><span> competition, a multi-day, national-level, higher education competition and cyber hacking event held last month. The three researchers are Justin Hsu, Garrett Brown, and Drew Petry. <span>The Southeastern Cyber Cup is hosted by Georgia Tech’s Office of Information Technology in partnership with Deloitte. The virtual hacking event is open to cybersecurity and IT students and professionals and is held to generate enthusiasm and excitement around cybersecurity careers.&nbsp;</span></span></p>]]></summary>  <dateline>2024-01-03T00:00:00-05:00</dateline>  <iso_dateline>2024-01-03T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672652</item>      </media>  <hg_media>          <item>          <nid>672652</nid>          <type>image</type>          <title><![CDATA[GTRI-CIPHER researchers]]></title>          <body><![CDATA[<p><em>A photo of GTRI-CIPHER researchers. (Photo Credit: Christopher Moore). </em></p>]]></body>                      <image_name><![CDATA[2023_1215_PHOTO__Southeastern Cyber Cup_110_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/03/2023_1215_PHOTO__Southeastern%20Cyber%20Cup_110_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/03/2023_1215_PHOTO__Southeastern%20Cyber%20Cup_110_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/03/2023_1215_PHOTO__Southeastern%2520Cyber%2520Cup_110_0.jpg?itok=sa9F139r]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI-CIPHER researchers]]></image_alt>                    <created>1704294312</created>          <gmt_created>2024-01-03 15:05:12</gmt_created>          <changed>1704294403</changed>          <gmt_changed>2024-01-03 15:06:43</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="61371"><![CDATA[Hackathon]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="193341"><![CDATA[southeastern cyber cup]]></keyword>          <keyword tid="62761"><![CDATA[Deloitte]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="671814">  <title><![CDATA[GTRI, Georgia Tech Use Quantum Computing to Optimize CFD Applications ]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span>While quantum computing is still in its early stages, it has the power to unlock unprecedented speed and efficiency in solving complex computational fluid dynamics (CFD) problems that could revolutionize several industries, including the defense space.&nbsp;</span></p><p><span>The Georgia Tech Research Institute (GTRI) and Georgia Institute of Technology (Georgia Tech) are exploring how the powerful processing capabilities of quantum computers can expedite CFD’s resource-intensive simulations used in aircraft design, weather prediction, nuclear weapons testing and more. &nbsp;</span></p><p><span>“Through a collaboration between GTRI and Georgia Tech, we are developing an application of quantum computing to solve proof-of-principle problems in computational fluid dynamics that could streamline efficiencies and reduce costs across numerous industries,” said Bryan Gard, a GTRI senior research scientist who is leading this project.</span></p><p><span>Quantum computing offers a new way of doing computations using the principles of quantum mechanics, a science that explores the behavior of tiny particles such as atoms and photons. Computers and software that are built on the theories of quantum mechanics can process a large amount of information simultaneously and much faster than classical computers. That is because unlike classical computers, which use bits that are either 0 or 1, quantum computers use quantum bits or qubits.&nbsp;</span></p><p><span>Classical bits are similar to regular on/off switches, which can only exist in one state at a time. Qubits, meanwhile, can exist in multiple states at once thanks to a property in quantum mechanics known as superposition. &nbsp;</span></p><p><span>Because CFD involves complex simulations of how fluids, such as air or water, move and interact with different surfaces, classical computers often struggle with the immense number of calculations needed for such detailed simulations. The ability for quantum computers to process information in parallel could significantly speed up these simulations and produce more accurate results.&nbsp;</span></p><p><span>“Say you are examining how air flows over a plane wing and you want to identify the large- and small-scale dynamics of that interaction,” explained Gard. “This type of problem would be very hard for a classical computer to handle because it wouldn’t be able to examine those large- and small-scale aspects simultaneously.”&nbsp;</span></p><p><span>The team has split its research into two parts. The parts that involve linear differential equations are solved on a quantum computer and the other, non-linear parts are handled conventionally on a classical machine.&nbsp;</span></p><p><span>The reason for this division is that as the problem scales up on classical supercomputers, the communication between nodes becomes inefficient, creating a bottleneck. Even though quantum computers are not yet large-scale, they can handle certain parts of the problem without facing the same communication challenges, Gard explained.&nbsp;</span></p><p><span>These principles could help organizations strategically allocate resources and avoid costs associated with manufacturing and testing potentially flawed designs. In the defense realm, an example of this can be seen with designing aircraft.&nbsp;</span></p><p><span>Instead of the conventional methods of building and testing structures in a wind tunnel, quantum-enhanced CFD would allow engineers to analyze stresses, assess designs and predict performance more efficiently and cost effectively. This becomes particularly relevant at high speeds, where factors such as air flows and turbulence pose additional challenges for running accurate simulations.&nbsp;</span></p><p><span>“It all comes down to money, as with everything else,” said Gard. “If you could save yourself a lot of time and money by running this simulation, which you couldn't do before, then it would allow you to allocate your resources more effectively.”&nbsp;</span></p><p><span>For this project, GTRI is collaborating with Spencer Bryngelson, an assistant professor in the School of Computational Science and Engineering who has expertise in computational physics, numerical methods, fluid dynamics and high-performance computing. Zhixin Song, a graduate student at Georgia Tech who is researching quantum algorithms for CFD, has also contributed.&nbsp; &nbsp;</span></p><p><span>“This project is particularly interesting because although it is challenging, it could have outsize performance gains if one can find the right tools for the job, meaning the right quantum algorithm to solve the right fluid dynamics problem,” Bryngelson said. “GTRI and Georgia Tech have already made progress in this area, and also work well together, so it has been a good experience.”&nbsp;</span></p><p><span>The project has been supported by GTRI’s Independent Research and Development (IRAD) Program, winning an IRAD of the Year award in fiscal year 2023, and the Defense Advanced Research Projects Agency (DARPA).&nbsp;</span></p><p>&nbsp;</p><p><span>Writer: Anna Akins&nbsp;</span><br /><span>Photos: Christopher Moore&nbsp;</span><br /><span>Art Credit: Img2Go.com, Adobe&nbsp;</span><br /><span>GTRI Communications</span><br /><span>Georgia Tech Research Institute</span><br /><span>Atlanta, Georgia</span></p><p><span>The </span><a href="https://gtri.gatech.edu/" rel="noopener noreferrer" target="_blank"><strong>Georgia Tech Research Institute (GTRI)</strong></a><span> is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940</span><strong> </strong><span>million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</span></p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1704293756</created>  <gmt_created>2024-01-03 14:55:56</gmt_created>  <changed>1704294145</changed>  <gmt_changed>2024-01-03 15:02:25</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Tech Research Institute (GTRI) and Georgia Institute of Technology (Georgia Tech) are exploring how the powerful processing capabilities of quantum computers could streamline efficiencies and reduce costs across numerous industries.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Tech Research Institute (GTRI) and Georgia Institute of Technology (Georgia Tech) are exploring how the powerful processing capabilities of quantum computers could streamline efficiencies and reduce costs across numerous industries.]]></sentence>  <summary><![CDATA[<p><span>The Georgia Tech Research Institute (GTRI) and Georgia Institute of Technology (Georgia Tech) are exploring how the powerful processing capabilities of quantum computers can expedite CFD’s resource-intensive simulations used in aircraft design, weather prediction, nuclear weapons testing and more. &nbsp;</span></p>]]></summary>  <dateline>2024-01-03T00:00:00-05:00</dateline>  <iso_dateline>2024-01-03T00:00:00-05:00</iso_dateline>  <gmt_dateline>2024-01-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672651</item>          <item>672650</item>      </media>  <hg_media>          <item>          <nid>672651</nid>          <type>image</type>          <title><![CDATA[AI-generated graphic of complex CFD simulations]]></title>          <body><![CDATA[<p><em>The ability for quantum computers to process a large amount of information simultaneously could significantly speed up complex CFD simulations and produce more accurate results (Credit: AI art generator Img2Go.com). </em></p>]]></body>                      <image_name><![CDATA[output_3156885427_0_v2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/03/output_3156885427_0_v2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/03/output_3156885427_0_v2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/03/output_3156885427_0_v2.jpg?itok=sF8sOGFB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[AI-generated graphic of complex CFD simulations]]></image_alt>                    <created>1704293609</created>          <gmt_created>2024-01-03 14:53:29</gmt_created>          <changed>1704293733</changed>          <gmt_changed>2024-01-03 14:55:33</gmt_changed>      </item>          <item>          <nid>672650</nid>          <type>image</type>          <title><![CDATA[GT's Quantum Computing Research Team]]></title>          <body><![CDATA[<p><em>The team leading this project includes, from left to right: Bryan Gard, a GTRI senior research scientist; Spencer Bryngelson, an assistant professor in Georgia Tech's School of Computational Science and Engineering; and Zhixin "Jack" Song, a Georgia Tech graduate student who is researching quantum algorithms for CFD (Photo Credit: Christopher Moore, GTRI). </em></p>]]></body>                      <image_name><![CDATA[2023_1212_IMAGE__QOCFD shoot_Gard Bryan _008.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2024/01/03/2023_1212_IMAGE__QOCFD%20shoot_Gard%20Bryan%20_008.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2024/01/03/2023_1212_IMAGE__QOCFD%20shoot_Gard%20Bryan%20_008.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2024/01/03/2023_1212_IMAGE__QOCFD%2520shoot_Gard%2520Bryan%2520_008.jpg?itok=i_hA1-0i]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GT's Quantum Computing Research Team]]></image_alt>                    <created>1704293415</created>          <gmt_created>2024-01-03 14:50:15</gmt_created>          <changed>1704293588</changed>          <gmt_changed>2024-01-03 14:53:08</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="690"><![CDATA[darpa]]></keyword>          <keyword tid="7141"><![CDATA[IRAD]]></keyword>          <keyword tid="166983"><![CDATA[School of Computational Science and Engineering]]></keyword>          <keyword tid="193392"><![CDATA[quantum algorithms]]></keyword>          <keyword tid="4359"><![CDATA[quantum computing]]></keyword>          <keyword tid="193393"><![CDATA[computational fluid dynamics]]></keyword>          <keyword tid="193394"><![CDATA[defense space]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668615">  <title><![CDATA[Machine Learning Maestros]]></title>  <uid>34434</uid>  <body><![CDATA[<p><em>This feature supports Georgia Tech's presence at the <a href="https://sites.gatech.edu/icml-2023/">International Conference on Machine Learning</a>, July 23-29 in Honolulu.&nbsp;</em></p><p><strong><a href="https://sites.gatech.edu/icml-2023/highlights/">Honolulu Highlights | ICML 2023</a><br /><span>Students and faculty have been focused and energized in their efforts this week engaging with the international machine learning community at ICML. See some of those efforts, hear from students themselves in our video series, and read about their latest contributions in #AI.</span></strong></p><p>Georgia Tech’s experts and larger research community&nbsp;are invested in a future where artificial intelligence (AI) solutions can benefit individuals and communities across our planet. Meet the machine learning maestros among Georgia Tech’s faculty at the International Conference on Machine Learning — July 23-29, 2023, in Honolulu — and learn about their work. The faculty in the main program are working with partners across many domains and industries to help invent powerful new ways for technology to benefit all our futures.</p><p>One of the experts in Honolulu is <a href="https://wliao60.math.gatech.edu">Wenjing Liao</a>, an assistant professor in the <a href="https://math.gatech.edu">School of Mathematics</a>. In addition to machine learning, Liao's research interests include imaging, signal processing, and high dimensional data analysis.</p><p><em>Learn more about the Georgia Tech contingent at the ICML <a href="https://sites.gatech.edu/icml-2023/">here</a>. Read more about machine learning research at Georgia Tech <a href="https://ml.gatech.edu">here.</a></em></p>]]></body>  <author>Renay San Miguel</author>  <status>1</status>  <created>1690404237</created>  <gmt_created>2023-07-26 20:43:57</gmt_created>  <changed>1702573769</changed>  <gmt_changed>2023-12-14 17:09:29</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech's machine learning experts, including an assistant professor in the School of Mathematics, are sharing their knowledge at the International Conference on Machine Learning.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech's machine learning experts, including an assistant professor in the School of Mathematics, are sharing their knowledge at the International Conference on Machine Learning.]]></sentence>  <summary><![CDATA[<p>Georgia Tech's machine learning experts, including Wenjing Liao, an assistant professor in the School of Mathematics, are sharing their knowledge this week at the International Conference on Machine Learning in Hawaii.</p>]]></summary>  <dateline>2023-07-20T00:00:00-04:00</dateline>  <iso_dateline>2023-07-20T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-07-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Georgia Tech's machine learning experts, including an assistant professor in the School of Mathematics, are sharing their knowledge at the International Conference on Machine Learning.]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[renay.san@cos.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Renay San Miguel<br />Communications Officer II/Science Writer<br />College of Sciences<br />404-894-5209</p><p>&nbsp;</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671261</item>      </media>  <hg_media>          <item>          <nid>671261</nid>          <type>image</type>          <title><![CDATA[Wenjing Liao.png]]></title>          <body><![CDATA[<p>Wenjing Liao</p>]]></body>                      <image_name><![CDATA[Wenjing Liao.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/07/26/Wenjing%20Liao.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/07/26/Wenjing%20Liao.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/07/26/Wenjing%2520Liao.png?itok=ZGk80SSm]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Wenjing Liao]]></image_alt>                    <created>1690404927</created>          <gmt_created>2023-07-26 20:55:27</gmt_created>          <changed>1690404927</changed>          <gmt_changed>2023-07-26 20:55:27</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://cos.gatech.edu/news/mathematics-wenjing-liao-wins-nsf-career-award]]></url>        <title><![CDATA[Mathematics’ Wenjing Liao Wins NSF CAREER Award]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/georgia-tech-partners-atlanta-colleges-data-science-education]]></url>        <title><![CDATA[Georgia Tech Partners with Atlanta Colleges on Data Science Education]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/college-sciences-faculty-staff-honored-2021-diversity-symposium]]></url>        <title><![CDATA[College of Sciences Faculty, Staff Honored at 2021 Diversity Symposium]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1279"><![CDATA[School of Mathematics]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="133"><![CDATA[Special Events and Guest Speakers]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="133"><![CDATA[Special Events and Guest Speakers]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>      </news_terms>  <keywords>          <keyword tid="192258"><![CDATA[cos-data]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668253">  <title><![CDATA[Gauging Glaciers: Alex Robel Awarded NSF CAREER Grant for New Ice Melt Modeling Tool]]></title>  <uid>35599</uid>  <body><![CDATA[<p><a href="https://eas.gatech.edu/people/robel-dr-alexander"><span><span><span><strong><span><span><span><span>Alex Robel</span></span></span></span></strong></span></span></span></a><span><span><span><span><span><span> is improving how computer models of melting ice sheets incorporate data from field expeditions and satellites by creating a new open-access software package — complete with state-of-the-art tools and paired with ice sheet models that anyone can use, even on a laptop or home computer.</span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>Improving these models is critical: while melting ice sheets and glaciers are top contributors to sea level rise, there are still large uncertainties in sea level projections at 2100 and beyond.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span>“Part of the problem is that the way that many models have been coded in the past has not been conducive to using these kinds of tools,” Robel, an assistant professor in the </span></span></span></span></span></span><a href="https://eas.gatech.edu/"><span><span><span><span><span><span><span><span>School of Earth and Atmospheric Sciences</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span>, explains. “It's just very labor-intensive to set up these data assimilation tools — it usually involves someone refactoring the code over several years.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“Our goal is to provide a tool that anyone in the field can use very easily without a lot of labor at the front end,” Robel says. “This project is really focused around developing the computational tools to make it easier for people who use ice sheet models to incorporate or inform them with the widest possible range of measurements from the ground, aircraft and satellites.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Now, a $780,000 NSF CAREER grant will help him to do so.&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>The National Science Foundation Faculty Early Career Development Award is a five-year funding mechanism designed to help promising researchers establish a personal foundation for a lifetime of leadership in their field. Known as CAREER awards, the grants are NSF’s most prestigious funding for untenured assistant professors.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“Ultimately,” Robel says, “this project will empower more people in the community to use these models and to use these models together with the observations that they're taking.”</span></span></span></span></span></span><br />&nbsp;</p><h3><span><span><span><strong><span><span>Ice sheets remember</span></span></strong></span></span></span></h3><p><span><span><span><span><span><span>“Largely, what models do right now is they look at one point in time, and they try their best — at that one point in time — to get the model to match some types of observations as closely as possible,” Robel explains. “From there, they let the computer model simulate what it thinks that ice sheet will do in the future.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>In doing so, the models often assume that the ice sheet starts in a state of balance, and that it is neither gaining nor losing ice at the start of the simulation. The problem with this approach is that ice sheets dynamically change, responding to past events — even ones that have happened centuries ago. “</span></span></span></span></span></span><span><span><span><span><span><span>W</span></span></span></span></span></span><span><span><span><span><span><span>e know from models and from decades of theory that the natural response time scale of thick ice sheets is hundreds to thousands of years,” Robel adds.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>By informing models with historical records, observations, and measurements, Robel hopes to improve their accuracy. “We have observations being made by satellites, aircraft, and field expeditions,” says Robel. “We also have historical accounts, and can go even further back in time by looking at geological observations or ice cores. These can tell us about the long history of ice sheets and how they've changed over hundreds or thousands of years.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Robel’s team plans to use a set of techniques called data assimilation to adjust, or ‘nudge’, models. “These data assimilation techniques have been around for a really long time,” Robel explains. “For example, they’re critical to weather forecasting: every weather forecast that you see on your phone was ultimately the product of a weather model that used data assimilation to take many observations and apply them to a model simulation.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“The next part of the project is going to be incorporating this data assimilation capability into a cloud-based computational ice sheet model,” Robel says. “We are planning to build an open source software package in Python that can use this sort of data assimilation method with any kind of ice sheet model.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Robel hopes it will expand accessibility. “Currently, it's very labor-intensive to set up these data assimilation tools, and while groups have done it, it usually involves someone re-coding and refactoring the code over several years.”</span></span></span></span></span></span></p><h3><span><span><span><strong><span><span>Building software for accessibility</span></span></strong></span></span></span></h3><p><span><span><span><span><span><span>Robel’s team will then apply their software package to a widely used model, which now has an online, browser-based version. “The reason why that is particularly useful is because the place where this model is running is also one of the largest community repositories for data in our field,” Robel says.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Called </span></span></span></span></span></span><a href="https://theghub.org/"><span><span><span><span><span><span><span><span>Ghub</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span>, this relatively new repository is designed to be a community-wide place for sharing data on glaciers and ice sheets. “Since this is also a place where the model is living, by adding this capability to this cloud-based model, we'll be able to directly use the data that's already living in the same place that the model is,” Robel explains.&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Users won’t need to download data, or have a high-speed computer to access and use the data or model. Researchers collecting data will be able to upload their data to the repository, and immediately see the impact of their observations on future ice sheet melt simulations. Field researchers could use the model to optimize their long-term research plans by seeing where collecting new data might be most critical for refining predictions.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“We really think that it is critical for everyone who's doing modeling of ice sheets to be doing this transient data simulation to make sure that our simulations across the field are all doing the best possible job to reproduce and match observations,” Robel says. While in the past, the time and labor involved in setting up the tools has been a barrier, “developing this particular tool will allow us to bring transient data assimilation to essentially the whole field.”</span></span></span></span></span></span></p><h3><span><span><span><strong><span><span>Bringing Real Data to Georgia’s K-12 Classrooms</span></span></strong></span></span></span></h3><p><span><span><span><span><span><span>The broad applications and user-base expands beyond the scientific community, and Robel is already developing a K-12 curriculum on sea level rise, in partnership with </span></span></span></span></span></span><a href="https://www.ceismc.gatech.edu/about/staffdirectory/jayma-koval"><span><span><span><span><span><span><span><span>Georgia Tech CEISMC Researcher Jayma Koval</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span>. “The students analyze data from real tide gauges and use them to learn about statistics, while also learning about sea level rise using real data,” he explains.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>Because the curriculum matches with state standards, teachers can download the curriculum, which is available for free online in partnership with the </span></span></span></span></span></span><a href="https://secoora.org/"><span><span><span><span><span><span><span><span>Southeast Coastal Ocean Observing Regional Association</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> (SECOORA), and incorporate it into their preexisting lesson plans. “We worked with SECOORA to pilot a </span></span></span></span></span></span><a href="https://secoora.org/education-outreach/sea-level-rise-curriculum/"><span><span><span><span><span><span><span><span>middle school curriculum</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> in Atlanta and Savannah, and </span></span></span></span></span></span><span><span><span><span><span><span>o</span></span></span></span></span></span><span><span><span><span><span><span>ne of the things that we saw was that there are a lot of teachers outside of middle school who are requesting and downloading the curriculum because they want to teach their students about sea level rise, in particular in coastal areas,” Robel adds.</span></span></span></span></span></span></p><p><span><span><span><span><span><span>In Georgia, there is a data science class that exists in many high schools that is part of the computer science standards for the state. “Now, we are partnering with a high school teacher to develop a second standards-aligned curriculum that is meant to be taught ideally in a data science class, computer class or statistics class,” Robel says. “It can be taught as a module within that class and it will be the more advanced version of the middle school sea level curriculum.”</span></span></span></span></span></span></p><p><span><span><span><span><span><span>The curriculum will guide students through using data analysis tools and coding in order to analyze real sea level data sets, while learning the science behind what causes variations and sea level, what causes sea level rise, and how to predict sea level changes.&nbsp;</span></span></span></span></span></span></p><p><span><span><span><span><span><span>“That gets students to think about computational modeling and how computational modeling is an important part of their lives, whether it's to get a weather forecast or play a computer game,” Robel adds. “Our goal is to get students to imagine how all these things are combined, while thinking about the way that we project future sea level rise.”</span></span></span></span></span></span></p><p>&nbsp;</p>]]></body>  <author>sperrin6</author>  <status>1</status>  <created>1687973953</created>  <gmt_created>2023-06-28 17:39:13</gmt_created>  <changed>1702573637</changed>  <gmt_changed>2023-12-14 17:07:17</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Robel will create a new open-access software package — complete with state-of-the-art tools and paired with ice sheet models that anyone can use, even on a laptop or home computer.]]></teaser>  <type>news</type>  <sentence><![CDATA[Robel will create a new open-access software package — complete with state-of-the-art tools and paired with ice sheet models that anyone can use, even on a laptop or home computer.]]></sentence>  <summary><![CDATA[<p><span><span><span><span><span><span><span>Alex Robel</span></span></span></span></span></span></span>, <span><span><span><span><span><span>assistant professor in the <span><span>School of Earth and Atmospheric Sciences</span></span></span></span></span></span></span></span>,<span><span><span><span><span><span>&nbsp;has been awarded a $780,000 NSF CAREER grant to improve how computer models of melting ice sheets incorporate data from field expeditions and satellites. Robel will create a new open-access software package — complete with state-of-the-art tools and paired with ice sheet models that anyone can use, even on a laptop or home computer.</span></span></span></span></span></span></p>]]></summary>  <dateline>2023-06-28T00:00:00-04:00</dateline>  <iso_dateline>2023-06-28T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-06-28 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jess.hunt@cos.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Written by Selena Langner</p><p>Contact: <a href="mailto:jess@cos.gatech.edu">Jess Hunt-Ralston</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671064</item>          <item>658812</item>      </media>  <hg_media>          <item>          <nid>671064</nid>          <type>image</type>          <title><![CDATA[Robel's open-access software package will pair state-of-the-art tools with ice sheet models that anyone can use]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Mosaic_Glacier_1.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/06/28/Mosaic_Glacier_1.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/06/28/Mosaic_Glacier_1.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/06/28/Mosaic_Glacier_1.png?itok=6CziN4dd]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[A stylized glacier (Selena Langner)]]></image_alt>                    <created>1687972518</created>          <gmt_created>2023-06-28 17:15:18</gmt_created>          <changed>1687974626</changed>          <gmt_changed>2023-06-28 17:50:26</gmt_changed>      </item>          <item>          <nid>658812</nid>          <type>image</type>          <title><![CDATA[Alex Robel (Credit: Allison Carter)]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[robel headshot.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/robel%20headshot.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/robel%20headshot.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/robel%2520headshot.jpg?itok=h3AO-mqe]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Alex Robel (Credit: Allison Carter)]]></image_alt>                    <created>1654895880</created>          <gmt_created>2022-06-10 21:18:00</gmt_created>          <changed>1687974677</changed>          <gmt_changed>2023-06-28 17:51:17</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://cos.gatech.edu/news/chemistry-chaos-peptides-and-infinite-problems-georgia-tech-researchers-pioneer-new-frontiers]]></url>        <title><![CDATA[Chemistry, Chaos, Peptides, and (Infinite) Problems: Georgia Tech Researchers Pioneer New Frontiers with NSF CAREER Grants]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="364801"><![CDATA[EAS]]></group>          <group id="565971"><![CDATA[Ocean Science and Engineering (OSE)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="154"><![CDATA[Environment]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="154"><![CDATA[Environment]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>      </news_terms>  <keywords>          <keyword tid="4896"><![CDATA[College of Sciences]]></keyword>          <keyword tid="61541"><![CDATA[Earth and Atmospheric Sciences]]></keyword>          <keyword tid="166926"><![CDATA[School of Earth and Atmospheric Sciences]]></keyword>          <keyword tid="192254"><![CDATA[cos-climate]]></keyword>          <keyword tid="192258"><![CDATA[cos-data]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667422">  <title><![CDATA[Solving the Infinite Problems: Anton Bernshteyn Awarded NSF CAREER for Developing New, Unified Theory: Descriptive Combinatorics]]></title>  <uid>35599</uid>  <body><![CDATA[<p><a href="https://abernshteyn3.math.gatech.edu/"><span><span><span><span><span><span><span><span>Anton Bernshteyn</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> is forging connections and creating a language to help computer scientists and mathematicians collaborate on new problems — in particular, bridging the gap between solvable, finite problems and more challenging, infinite problems. Now, an&nbsp;</span></span></span></span></span></span><span><span><span><span><span><span>NSF CAREER grant will help him achieve that goal.</span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>The National Science Foundation Faculty Early Career Development Award is a five-year grant designed to help promising researchers establish a foundation for a lifetime of leadership in their field. Known as CAREER awards, the grants are NSF’s most prestigious funding for untenured assistant professors.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>Bernshteyn,</span></span></span></span></span></span></span><span><span><span><span><span><span> an assistant professor in the </span></span></span></span></span></span><a href="https://abernshteyn3.math.gatech.edu/"><span><span><span><span><span><span><span><span>School of Mathematics,</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span> will focus on “</span></span></span></span></span></span><span><span><span><span><span><span><span>Developing a unified theory of descriptive combinatorics and local algorithms” — connecting concepts and work being done in two previously</span></span></span></span></span></span></span><span><span><span><span><span><span><span><span><span> </span></span></span></span></span></span></span></span></span><span><span><span><span><span><span><span>separate mathematical and computer science fields. “Surprisingly,” Bernshteyn says, “it turns out that these two areas are closely related, and that ideas and results from one can often be applied in the other.”&nbsp;</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>“This relationship is going to benefit both areas tremendously,” Bernshteyn says. “It significantly increases the number of tools we can use”</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>By pioneering this connection, Bernshteyn hopes to connect techniques that mathematicians use to study infinite structures (like dynamic, continuously evolving&nbsp; structures found in nature), with the algorithms computer scientists use to model large – but still limited – interconnected networks and systems (like a network of computers or cell phones).</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>“The final goal, for certain types of problems,” he continues, “is to take all these questions about complicated infinite objects and translate them into questions about finite structures, which are much easier to work with and have applications in practical large-scale computing.”</span></span></span></span></span></span></span></p><h3><span><span><span><strong><span><span>Creating a unified theory</span></span></strong></span></span></span></h3><p><span><span><span><span><span><span><span>It all started with </span></span></span></span></span></span></span><a href="https://arxiv.org/abs/2004.04905"><span><span><span><span><span><span><span><span><span>a paper Bernshteyn wrote in 2020</span></span></span></span></span></span></span></span></span></a><span><span><span><span><span><span><span>,</span></span></span></span></span></span></span><span><span><span><span><span><span><span> which showed that mathematics and computer science could be used in tandem to develop powerful problem-solving techniques. Since the fields used different terminology, however, it soon became clear that a “dictionary” or a unified theory would need to be created to help specialists communicate and collaborate. Now that dictionary is being built, bringing together two previously-distinct fields: distributed computing (a field of computer science), and descriptive set theory (a field of mathematics).&nbsp;</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>Computer scientists use distributed computing to study so-called “distributed systems,” </span></span></span></span></span></span></span><span><span><span><span><span><span><span>which model extremely large networks — like the Internet — that involve millions of interconnected machines that are operating independently (for example, b</span></span></span></span></span></span></span><span><span><span><span><span><span><span>lockchain, social networks, streaming services, and cloud computing systems).</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>“Crucially, these systems are decentralized,” Bernshteyn says. ”Although parts of the network can communicate with each other, each of them has limited information about the network’s overall structure and must make decisions based only on this limited information.” Distributed systems allow researchers to develop strategies — called distributed algorithms — that “enable solving difficult problems with as little knowledge of the structure of the entire network as possible,” he adds.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>At first, distributed algorithms appear entirely unrelated to the other area </span></span></span></span></span></span></span><a href="https://abernshteyn3.math.gatech.edu/"><span><span><span><span><span><span>Bernshteyn’s work brings together: </span></span></span></span></span></span></a><span><span><span><span><span><span><span>descriptive set theory, an area of pure mathematics concerned with infinite sets defined by “simple” mathematical formulas.&nbsp;</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>“Sets that do not have such simple definitions typically have properties that make them unsuitable for applications in other areas of mathematics. For example, they are often non-measurable – meaning that it is impossible, even in principle, to determine their length, area, or volume," Bernshteyn says.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>Because undefinable sets are difficult to work with, descriptive set theory aims to understand which problems have “definable”— and therefore more widely applicable— solutions. Recently, a new subfield called descriptive combinatorics has emerged. “Descriptive combinatorics focuses specifically on problems inspired by the ways collections of discrete, individual objects can be organized</span></span></span></span></span></span></span><span><span><span><span><strong><span><span>,” </span></span></strong></span></span></span></span><span><span><span><span><span><span><span>Bernshteyn explains. “Although the field is quite young, it has already found a number of exciting applications in other areas of math.”</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>The key connection? Since the algorithms used by computer scientists in distributed computing are designed to perform well on extremely large networks, they can also be used by mathematicians interested in infinite problems.</span></span></span></span></span></span></span></p><h3><span><span><span><span><strong><span><span>Solving infinite problems</span></span></strong></span></span></span></span></h3><p><span><span><span><span><span><span><span>Infinite problems often occur in nature, and the field of descriptive combinatorics has been particularly successful in helping to understand dynamical systems: structures that evolve with time according to specified laws (such as the flow of water in a river or the movement of planets in the Solar System). “Most mathematicians work with continuous, infinite objects, and hence they may benefit from the insight contributed by descriptive set theory,” </span>Bernshteyn<span> adds.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>However, while infinite problems are common, they are also notoriously difficult to solve. “In infinite problems, there is no software that can tell you if the problem is solvable or not. There are infinitely many things to try, so it is impossible to test all of them. But if we can make our problems finite, we can sometimes determine which ones can and cannot be solved efficiently,” Bernshteyn says. “We may be able to determine which combinatorial problems can be solved in the infinite setting and get an explicit solution.”</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>“It turns out that, with some work, it is possible to implement the algorithms used in distributed computing on infinite networks, providing definable solutions to various combinatorial problems,” Bernshteyn says. “Conversely, in certain limited settings it is possible to translate definable solutions to problems on infinite structures into efficient distributed algorithms — although this part of the story is yet to be fully understood.”</span></span></span></span></span></span></span></p><h3><span><span><span><span><strong><span><span>A new frontier</span></span></strong></span></span></span></span></h3><p><span><span><span><span><span><span><span>As a recently emerged field, descriptive combinatorics is rapidly evolving, putting Bernshteyn and his research on the cutting edge of discovery.&nbsp;</span></span></span></span></span></span></span><span><span><span><span><span><span><span>“There’s this new communication between separate fields of math and computer science—this huge synergy right now—it’s incredibly exciting,” Bernshteyn says.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>Introducing new researchers to descriptive combinatorics, especially graduate students, is another priority for Bernshteyn. His CAREER grant funds will be especially dedicated to training graduate students who might not have had prior exposure to descriptive set theory. Bernshteyn also aims to design a suite of materials ranging from textbooks, lecture notes, instructional videos, workshops, and courses to support students and scholars as they enter this new field.</span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>“There’s so much knowledge that’s been acquired,” Bernshteyn says. “There’s work being done by people within computer science, set theory, and so on. But researchers in these fields speak different languages, so to say, and a lot of effort needs to go into creating a way for them to understand each other. Unifying these fields will ultimately allow us to understand them all much better than we did before. Right now we’re only starting to glimpse what’s possible.”</span></span></span></span></span></span></span></p>]]></body>  <author>sperrin6</author>  <status>1</status>  <created>1681873371</created>  <gmt_created>2023-04-19 03:02:51</gmt_created>  <changed>1702573567</changed>  <gmt_changed>2023-12-14 17:06:07</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The new theory brings together work from mathematics and computer science, greatly increasing the tools available to both fields.]]></teaser>  <type>news</type>  <sentence><![CDATA[The new theory brings together work from mathematics and computer science, greatly increasing the tools available to both fields.]]></sentence>  <summary><![CDATA[<p><span><span><span><span><span><span><span><span>Anton Bernshteyn</span></span> is forging connections and creating a language to help computer scientists and mathematicians collaborate on new problems — in particular, bridging the gap between solvable, finite problems and more challenging, infinite problems. Now, an&nbsp;</span></span></span></span></span></span><span><span><span><span><span><span>NSF CAREER grant will help him achieve that goal.</span></span></span></span></span></span></p>]]></summary>  <dateline>2023-04-18T00:00:00-04:00</dateline>  <iso_dateline>2023-04-18T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-04-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jess.hunt@cos.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Written by Selena Langner</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670579</item>          <item>670581</item>      </media>  <hg_media>          <item>          <nid>670579</nid>          <type>image</type>          <title><![CDATA[Mosaic Network]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Mosaic_Network.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/04/18/Mosaic_Network.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/04/18/Mosaic_Network.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/04/18/Mosaic_Network.png?itok=bXj8PHRU]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[A blue image of interconnected nodes]]></image_alt>                    <created>1681840456</created>          <gmt_created>2023-04-18 17:54:16</gmt_created>          <changed>1681840488</changed>          <gmt_changed>2023-04-18 17:54:48</gmt_changed>      </item>          <item>          <nid>670581</nid>          <type>image</type>          <title><![CDATA[Anton Bernshteyn Portrait]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Anton_Headshot.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/04/18/Anton_Headshot.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/04/18/Anton_Headshot.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/04/18/Anton_Headshot.jpeg?itok=5ZKWabGN]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A portrait of Anton Bernshteyn. He is standing in front of a chalkboard that is covered with mathematical equations.]]></image_alt>                    <created>1681840556</created>          <gmt_created>2023-04-18 17:55:56</gmt_created>          <changed>1681840624</changed>          <gmt_changed>2023-04-18 17:57:04</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://cos.gatech.edu/news/chemistry-chaos-peptides-and-infinite-problems-georgia-tech-researchers-pioneer-new-frontiers]]></url>        <title><![CDATA[Chemistry, Chaos, Peptides, and (Infinite) Problems: Georgia Tech Researchers Pioneer New Frontiers with NSF CAREER Grants]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/fundamental-questions-jesse-mcdaniel-awarded-nsf-career-grant-research-new-method-predicting]]></url>        <title><![CDATA[The Fundamental Questions: Jesse McDaniel Awarded NSF CAREER Grant for Research Into New Method of Predicting Chemical Reaction Rates, Leveraging Computer Modeling Primary tabs]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/making-medicines-vinayak-agarwal-awarded-nsf-career-grant-peptide-research]]></url>        <title><![CDATA[Making Medicines: Vinayak Agarwal Awarded NSF CAREER Grant for Peptide Research]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/chasing-chaos-alex-blumenthal-awarded-career-grant-research-chaos-fluid-dynamics]]></url>        <title><![CDATA[Chasing Chaos: Alex Blumenthal Awarded CAREER Grant for Research in Chaos, Fluid Dynamics]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1279"><![CDATA[School of Mathematics]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>      </news_terms>  <keywords>          <keyword tid="192249"><![CDATA[cos-community]]></keyword>          <keyword tid="192258"><![CDATA[cos-data]]></keyword>          <keyword tid="173647"><![CDATA[_for_math_site_]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>      </keywords>  <core_research_areas>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="664290">  <title><![CDATA[AF2Complex ‘Computational Microscope’ Predicts Protein Interactions, Potential Paths to New Antibiotics  ]]></title>  <uid>35575</uid>  <body><![CDATA[<p>Though it is a cornerstone of virtually every process that occurs in living organisms, the proper folding and transport of biological proteins is a notoriously difficult and time-consuming process to experimentally study.</p><p>In a new paper published in <em>eLife</em>, researchers in the <a href="https://biosciences.gatech.edu/" target="_blank">School of Biological Sciences</a> and the <a href="https://www.cc.gatech.edu/" target="_blank">School of Computer Science</a> have shown that AF2Complex may be able to lend a hand.</p><p>Building on the models of <a href="https://www.deepmind.com/" target="_blank">DeepMind</a>’s <a href="https://www.deepmind.com/research/highlighted-research/alphafold" target="_blank">AlphaFold 2</a>, a machine learning tool able to predict the detailed three-dimensional structures of individual proteins, AF2Complex — short for AlphaFold 2 Complex — is a deep learning tool designed to <a href="https://cos.gatech.edu/news/af2complex-researchers-leverage-deep-learning-predict-physical-interactions-protein-complexes" target="_blank">predict the physical interactions of multiple proteins</a>. With these predictions, AF2Complex is able to calculate which proteins are likely to interact with each other to form functional complexes in unprecedented detail.</p><p>“We essentially conduct computational experiments that try to figure out the atomic details of supercomplexes (large interacting groups of proteins) important to biological functions,” explained <a href="https://biosciences.gatech.edu/people/jeffrey-skolnick" target="_blank">Jeffrey Skolnick</a>, Regents’ Professor and Mary and Maisie Gibson Chair in the School of Biological Sciences, and one of the corresponding authors of the study. With AF2Complex, which was developed last year by the same research team, it’s “like using a computational microscope powered by deep learning and supercomputing.”</p><p>In their latest study, the researchers used this ‘computational microscope’ to examine a complicated protein synthesis and transport pathway, hoping to clarify how proteins in the pathway interact to ultimately transport a newly synthesized protein from the interior to the outer membrane of the bacteria — and identify players that experiments might have missed. Insights into this pathway may identify new targets for antibiotic and therapeutic design while providing a foundation for using AF2Complex to computationally expedite this type of biology research as a whole.</p><h3>Computing complexes</h3><p>Created by London-based artificial intelligence lab DeepMind, AlphaFold 2 is a deep learning tool able to generate accurate predictions about the three-dimensional structure of single proteins using just their building blocks, amino acids. Taking things a step further, AF2Complex uses these structures to predict the likelihood that proteins are able to interact to form a functional complex, what aspects of each structure are the likely interaction sites, and even what protein complexes are likely to pair up to create even larger functional groups called supercomplexes.</p><p>“The successful development of AF2Complex earlier this year makes us believe that this approach has tremendous potential in identifying and characterizing the set of protein-protein interactions important to life,” shared <a href="https://biosciences.gatech.edu/people/mu_gao" target="_blank">Mu Gao</a>, a senior research scientist at Georgia Tech. “To further convince the broad molecular biology community, we [had to] demonstrate it with a more convincing, high impact application.”</p><p>The researchers chose to apply AF2Complex to a pathway in <em>Escherichia coli</em> (<em>E. coli</em>), a model organism in life sciences research commonly used for experimental DNA manipulation and protein production due to its relative simplicity and fast growth.&nbsp;</p><p>To demonstrate the tool’s power, the team examined the synthesis and transport of proteins that are essential for exchanging nutrients and responding to environmental stressors: outer membrane proteins, or OMPs for short. These proteins reside on the outermost membrane of gram-negative bacteria, a large family of bacteria characterized by the presence of inner and outer membranes, like <em>E. coli</em>. However, the proteins are created inside the cell and must be transported to their final destinations.&nbsp;</p><p>“After more than two decades of experimental studies, researchers have identified some of the protein complexes of key players, but certainly not all of them,” Gao explained. AF2Complex “could enable us to discover some novel and interesting features of the OMP biogenesis pathway that were missed in previous experimental studies.”</p><h3>New insights</h3><p>Using the <a href="https://www.olcf.ornl.gov/summit/" target="_blank">Summit</a> supercomputer at the <a href="https://www.ornl.gov/" target="_blank">Oak Ridge National Laboratory</a>, the team, which included computer science undergraduate <a href="https://davinan.github.io/dna/" target="_blank">Davi Nakajima An</a>, put AF2Complex to the test. They compared a few proteins known to be important in the synthesis and transport of OMPs to roughly 1,500 other proteins — all of the known proteins in <em>E. coli</em>’s cell envelope — to see which pairs the tool computed as most likely to interact, and which of those pairs were likely to form supercomplexes.&nbsp;</p><p>To determine if AF2Complex’s predictions were correct, the researchers compared the tool’s predictions to known experimental data. “Encouragingly,” said Skolnick, “among the top hits from computational screening, we found previously known interacting partners.” Even within those protein pairs known to interact, AF2Complex was able to highlight structural details of those interactions that explain data from previous experiments, lending additional confidence to the tool’s accuracy.</p><p>In addition to known interactions, AF2Complex predicted several unknown pairs. Digging further into these unexpected partners revealed details on what aspects of the pairs might interact to form larger groups of functional proteins, likely active configurations of complexes that have previously eluded experimentalists, and new potential mechanisms for how OMPs are synthesized and transported.&nbsp;</p><p>“Since the outer membrane pathway is both vital and unique to gram-negative bacteria, the key proteins involved in this pathway could be novel targets for new antibiotics,” said Skolnick. “As such, our work that provides molecular insights about these new drug targets might be valuable to new therapeutic design.”</p><p>Beyond this pathway, the researchers are hopeful that AF2Complex could mean big things for biology research.&nbsp;</p><p>“Unlike predicting structures of a single protein sequence, predicting the structural model of a supercomplex can be very complicated, especially when the components or stoichiometry of the complex is unknown,” Gao noted. “In this regard, AF2Complex could be a new computational tool for biologists to conduct trial experiments of different combinations of proteins,” potentially expediting and increasing the efficiency of this type of biology research as a whole.</p><p><strong>AF2Complex is an open-source tool available to the public and can be downloaded <a href="https://github.com/FreshAirTonight/af2complex" target="_blank">here</a>.</strong></p><p><em>This work was supported in part by the DOE Office of Science, Office of Biological and Environmental Research (DOE DE-SC0021303) and the Division of General Medical Sciences of the National Institute Health (NIH R35GM118039).&nbsp;DOI: </em><a href="https://doi.org/10.7554/eLife.82885"><em>https://doi.org/10.7554</em></a></p>]]></body>  <author>adavidson38</author>  <status>1</status>  <created>1672766054</created>  <gmt_created>2023-01-03 17:14:14</gmt_created>  <changed>1702573415</changed>  <gmt_changed>2023-12-14 17:03:35</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are using AF2Complex, a deep learning tool designed to predict the physical interactions of proteins, to shed light on an important biological pathway — and pave the way to computationally expedite biology research.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are using AF2Complex, a deep learning tool designed to predict the physical interactions of proteins, to shed light on an important biological pathway — and pave the way to computationally expedite biology research.]]></sentence>  <summary><![CDATA[<p>In a new paper published in <em>eLife,</em> School of Biological Sciences and School of Computer Science researchers show how AF2Complex, a deep learning tool designed to predict the physical interactions of proteins, is lending new insights into protein synthesis and transport — and paving the way to computationally expedite biology research as a whole.</p>]]></summary>  <dateline>2023-01-04T00:00:00-05:00</dateline>  <iso_dateline>2023-01-04T00:00:00-05:00</iso_dateline>  <gmt_dateline>2023-01-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jess@cos.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Writer:&nbsp;</strong><a href="mailto:davidson.audra@gatech.edu">Audra Davidson</a><br />Communications Officer<br />College of Sciences at Georgia Tech</p><p><strong>Editor:&nbsp;</strong>Jess Hunt-Ralston<br />Director of Communications<br />College of Sciences at Georgia Tech</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>657354</item>          <item>664288</item>      </media>  <hg_media>          <item>          <nid>657354</nid>          <type>image</type>          <title><![CDATA[Researchers Jeffrey Skolnick and Mu Gao at the Engineered Biosystems Building at Georgia Tech. (Photo: Jess Hunt-Ralston)]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2022 04 Jeffrey Skolnick and Mu Gao - Biosci research copy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2022%2004%20Jeffrey%20Skolnick%20and%20Mu%20Gao%20-%20Biosci%20research%20copy.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2022%2004%20Jeffrey%20Skolnick%20and%20Mu%20Gao%20-%20Biosci%20research%20copy.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2022%252004%2520Jeffrey%2520Skolnick%2520and%2520Mu%2520Gao%2520-%2520Biosci%2520research%2520copy.jpg?itok=IgFWtGVk]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1650045007</created>          <gmt_created>2022-04-15 17:50:07</gmt_created>          <changed>1650045007</changed>          <gmt_changed>2022-04-15 17:50:07</gmt_changed>      </item>          <item>          <nid>664288</nid>          <type>image</type>          <title><![CDATA[Examples of protein complexes modeled by AF2Complex residing between the inner and outer membranes of E. coli]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cover image v7.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cover%20image%20v7.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cover%20image%20v7.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cover%2520image%2520v7.png?itok=eLiNVQPz]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1672765216</created>          <gmt_created>2023-01-03 17:00:16</gmt_created>          <changed>1672766090</changed>          <gmt_changed>2023-01-03 17:14:50</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://ascr-discovery.org/2023/01/computing-function-from-form/]]></url>        <title><![CDATA[ASCR Discovery: Computing function from form]]></title>      </link>          <link>        <url><![CDATA[https://cos.gatech.edu/news/af2complex-researchers-leverage-deep-learning-predict-physical-interactions-protein-complexes]]></url>        <title><![CDATA[AF2Complex: Researchers Leverage Deep Learning to Predict Physical Interactions of Protein Complexes]]></title>      </link>          <link>        <url><![CDATA[https://research.gatech.edu/ai-tool-pairs-protein-pathways-clinical-side-effects-patient-comorbidities-suggest-targeted-covid]]></url>        <title><![CDATA[AI Tool Pairs Protein Pathways with Clinical Side Effects, Patient Comorbidities to Suggest Targeted Covid-19 Treatments]]></title>      </link>          <link>        <url><![CDATA[https://github.com/FreshAirTonight/af2complex]]></url>        <title><![CDATA[Download AF2Complex]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="1275"><![CDATA[School of Biological Sciences]]></group>      </groups>  <categories>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="192258"><![CDATA[cos-data]]></keyword>          <keyword tid="192250"><![CDATA[cos-microbial]]></keyword>          <keyword tid="190336"><![CDATA[AF2Complex]]></keyword>          <keyword tid="12761"><![CDATA[E. Coli Bacteria]]></keyword>          <keyword tid="191799"><![CDATA[outer membrane proteins]]></keyword>          <keyword tid="166882"><![CDATA[School of Biological Sciences]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="187582"><![CDATA[go-ibb]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="671238">  <title><![CDATA[STEM@GTRI Celebrates 25 Years of Promoting Science, Technology Education]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span>Recently, GTRI leadership and research faculty were joined by State of Georgia leaders, corporate representatives, and educators to celebrate a notable milestone for an important GTRI program.</span></p><p><a href="https://gtri.gatech.edu/stem/high-school-summer-internship"><span>STEM@GTRI</span></a><span> celebrated its 25th anniversary recently. STEM @GTRI is the Georgia Tech Research Institute's K-12 outreach program. STEM @GTRI strives to inspire, engage, and impact Georgia's students and educators through hands-on experiences, outreach, and professional learning.</span></p><p><span>STEM@GTRI customizes professional development experiences for educators, connects students and classrooms to Georgia Tech labs and researchers, and brings hands-on, fun, and relevant programming to STEM (science, technology, engineering, and math) educational outreach events across Georgia. STEM@GTRI leverages State of Georgia funding through grants and partnerships to bring additional STEM programming to K-12 students in Georgia. The program first received State of Georgia funding in 1998.</span></p><p><span>To commemorate this auspicious occasion, STEM@GTRI hosted a luncheon celebrating 25 years of K-12 STEM outreach at GTRI. During the program, an array of speakers reflected on the STEM @GTRI program over the past 25 years and its impact in Georgia and on the future of students.</span></p><h2><span>STEM @GTRI’s First Champion: Claudia Huff</span></h2><p><span>Claudia Huff, the retired GTRI Principal Research Associate who was the first Director of STEM @GTRI, spoke on its inspirational and aspirational early days. She noted that, in 1998, the U.S. was experiencing a rapid permeation of emphasis on STEM education, fueled by legislation such as the Telecommunications Act of 1996. However, while there was a desire to increase technology education, the actual means lagged.</span></p><p><span>“Computers were coming to the schools, but they weren't ready. There were computer-using educators that are scattered across the state of the country, but they were really organized together, and they hadn't seen some of the things that we could see coming down the road,” she said. That was, in large part, the impetus for the program, which was then called Foundations for the Future (F3).</span></p><p><span>She embraced and pioneered the partnership-seeking approach that is now a hallmark of the renamed STEM@GTRI.</span></p><p><span>Huff started with a small amount of seed funding from GTRI. However, her dogged determination led her to secure $2 million in funding from AT&amp;T to really get the ball rolling. The AT&amp;T funds were leveraged into that all-important funding from the State of Georgia, which continues to the present.</span></p><p><span>“I think the biggest impact was getting everybody aware, or getting people who needed the resources aware that we have resources, letting them know,” Claudia said.</span></p><p><span>The principles and practices that she put into place out of necessity became the foundation for what STEM@GTRI is 25 years later.</span></p><p><span>To honor and thank Claudia Huff, she was presented with STEM @GTRI’s inaugural STEM Champion Award.</span></p><h2><span>Educating Future Technology Leaders</span></h2><p><span>GTRI Director Jim Hudgens said that when he first arrived at GTRI four years ago, STEM @GTRI was one of the first programs he heard about: “I was just blown away by the program,” he said during his opening remarks.</span></p><p><span>“Educating future technology leaders is one of our core mission areas,” said Hudgens. “A big part of what we do in educating technology leaders is that we take it very seriously. Our people are extremely passionate about this--about their many volunteer hours going out to science fairs, going to high schools across the state, teaching classes in high schools--doing as much as they can.</span></p><p><span>“It's an amazing community at GTRI that makes this happen.”</span></p><p><span>That passion and spirit of commitment was noted often during the 25th Anniversary luncheon.</span></p><p><span>The anniversary event was hosted by Leigh McCook, Director of STEM @GTRI, which she calls “a fun role.” Her passion and commitment to STEM@GTRI was noted by speakers throughout the luncheon program.</span></p><p><span>“One of the greatest impacts I get to experience is working with our K-12 future STEM workforce. When I see a Georgia Tech/GTRI researcher explain and demonstrate their work to a classroom of elementary, middle, or high school students or experience students of all ages interact with our researchers through questions and discovery — I am thrilled to witness students have that ‘ah ha!’ moment and think ‘This is cool stuff! I want to study to learn to be a (fill in the STEM field here),’ or even ‘Oh, now I know why I’m having to learn this topic in my class — someone really does use this stuff in the real world!’</span></p><p><span>“When we get to bring diversity to Georgia’s classrooms across the state through our outreach, we open worlds of awareness of possibilities and opportunities for our K-12 students.”</span></p><h2><span>Bringing ‘What If’ to the Real World Through Partnerships</span></h2><p><span>“Real-world” impact, and opening students’ (and teachers’) eyes and minds to possibilities were common themes reiterated by the luncheon speakers.</span></p><p><span>District 25 State Rep. Todd Jones spoke of several of his “dreams” for the State of Georgia: advancements in daily life, from improved transportation to medical advances—all “dreams” that are dependent on significant advances in technology, which Jones said he believes is incumbent on advancing technology education throughout Georgia, including in rural areas without extensive technology resources or even a large quantity of technology educators. That, he said, is where STEM @GTRI’s outreach is invaluable.</span></p><p><span>Jones said that his office’s ongoing partnership with GTRI is key to improving the “access and rigor” of STEM education in Georgia.</span></p><p><span>“I'm going to give all the credit to GTRI. There might have been passion coming out of my office and willingness to find a partner to make this happen, but between Bert (Reeves, Vice President, Institute Relations) and the GTRI team, that is what kind of made this a success.</span></p><p><span>“We did know that GTRI had the resources to be able to make this work. What they had to deal with for a couple of decades around STEM, around the work, shows a passion and an application. That was what we were looking for.”</span></p><p><span>McCook noted that Jones’ initiative to improve access and rigor of computer science education across Georgia,&nbsp;as part of the newly funded Rural Computer Science Education Program,&nbsp;shows how committed STEM @GTRI is about fostering and furthering partners. She noted that,&nbsp;&nbsp;in partnership with Georgia Tech’s Center for Education Integrating Science, Mathematics, and Computing (CEISMC),&nbsp;the project is “in 16 (Georgia school) districts right now” and includes contributions from&nbsp;the Institute for People and Technology (IPaT), the Institute for Robotics and Intelligent Machines (IRIM), and others.</span></p><p><span>“You can't dream it if you've never been exposed to it,” Jones said enthusiastically “Dreams come from ‘what if,’ but ‘what if’ can't be had unless you know what's possible and maybe what could be next.”</span></p><p><span>Such a commitment to fostering a sense of making “what if” possible was reiterated by Karen Faircloth, Director of School Improvement &amp; Professional Learning for the Northwest Georgia Regional Education Service Agency (RESA), which encompasses school districts in smaller communities such as Cartersville, Dallas, Rome, and Tallapoosa.</span></p><h2><span>STEM@GTRI High School Internship Program</span></h2><p><span>STEM@GTRI thrives today largely because of the indefatigable efforts of High School Summer Internship Program co-directors Therese Boston, a Senior Research Associate in ICL, and ATAS Principal Research Engineer Erick Maxwell. STEM@GTRI’s </span><a href="https://gtri.gatech.edu/stem/high-school-summer-internship"><span>High School Internship Program</span></a><span> is one of its premier initiatives. In the internship program, Georgia high school students who are at least 16 years old may apply for five-week paid summer internships hosted in GTRI labs. Interns work on projects in GTRI laboratories and the GTRI Warner Robins field office with the goal of providing students with real-world experiences in science and engineering research. GTRI researchers mentor students by working with them on projects to engage them in first-hand STEM experiences.</span></p><p><span>As an example of the first-hand nature of the internship, Maxwell cited a project done by an intern team in conjunction with the </span><a href="https://home.army.mil/stewart/units/3ID"><span>3rd Infantry Division (3ID)</span></a><span> at Fort Stewart, Georgia. The high schoolers developed a means to streamline the arduous task of counting ammunition rounds via the use of “smart” gloves. To further emphasize the tangible benefits of the students’ experience, Maxwell noted that the students are included on the project’s application for a full patent on the gloves.</span></p><p><span>The High School Internship Program and other programs of STEM@GTRI make use of partnerships with GTRI’s laboratories, Georgia Tech, the U.S. military, and businesses in technology-related industries.</span></p><p><span>Among the industry representatives in attendance was Patrick Govan, Higher Education Account Manager at Cisco. He explained how his company, a leader in digital communications technologies, works in outreach along with STEM@GTRI. “We are starting to work with the STEM outreach program, bringing some of the students and internships into our office--we just built a new office in the Coda building (at Tech Square). So, we're show showcasing how technology is used in everyday life and in office space to inspire the younger kids. [We show them] a day in the life of what a career would look like in the tech space.</span></p><p><span>“Leigh (McCook) and I are trying to get the [STEM@GTRI] summer internship program incorporated into office visits and things like that.”</span></p><p><span>Looking ahead to future goals and activities was very much a part of the 25th-anniversary celebration. Here’s to the next 25 years of STEM@GTRI!</span></p><p>&nbsp;</p><p><span><strong>Writer:</strong> Christopher Weems&nbsp;</span><br /><span><strong>Photos:</strong> Christopher J. Moore</span><br /><span>GTRI Communications</span><br /><span>Georgia Tech Research Institute</span><br /><span>Atlanta, Georgia</span></p><p><span>The </span><a href="https://gtri.gatech.edu/" rel="noopener noreferrer" target="_blank"><strong>Georgia Tech Research Institute (GTRI)</strong></a><span> is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940</span><strong> </strong><span>million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</span></p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1701105483</created>  <gmt_created>2023-11-27 17:18:03</gmt_created>  <changed>1701105780</changed>  <gmt_changed>2023-11-27 17:23:00</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[GTRI leadership and research faculty were joined by State of Georgia leaders, corporate representatives, and educators to celebrate the Georgia Tech Research Institute's K-12 outreach program.]]></teaser>  <type>news</type>  <sentence><![CDATA[GTRI leadership and research faculty were joined by State of Georgia leaders, corporate representatives, and educators to celebrate the Georgia Tech Research Institute's K-12 outreach program.]]></sentence>  <summary><![CDATA[<p><span><span>GTRI leadership and research faculty were joined by State of Georgia leaders, corporate representatives, and educators to celebrate 25 years of K-12 STEM outreach at GTRI. During the program, an array of speakers reflected on the STEM @GTRI program over the past 25 years and its impact in Georgia and on the future of students.</span></span></p>]]></summary>  <dateline>2023-11-27T00:00:00-05:00</dateline>  <iso_dateline>2023-11-27T00:00:00-05:00</iso_dateline>  <gmt_dateline>2023-11-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672449</item>          <item>672450</item>      </media>  <hg_media>          <item>          <nid>672449</nid>          <type>image</type>          <title><![CDATA[Claudia Huff, Receipent of the Inaugural STEM@GTRI Champion Award]]></title>          <body><![CDATA[<p>Claudia Huff (left) receives the inaugural STEM Champion Award from STEM@GTRI Director Leigh F. McCook. (photo credit: Christopher J. Moore)</p>]]></body>                      <image_name><![CDATA[2023_1106_PHOTO_ICL_25th Anniversary STEM GTRI_121.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/11/27/2023_1106_PHOTO_ICL_25th%20Anniversary%20STEM%20GTRI_121.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/11/27/2023_1106_PHOTO_ICL_25th%20Anniversary%20STEM%20GTRI_121.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/11/27/2023_1106_PHOTO_ICL_25th%2520Anniversary%2520STEM%2520GTRI_121.JPG?itok=lE0o1Feu]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Claudia Huff, Receipent of the Inaugural STEM@GTRI Champion Award]]></image_alt>                    <created>1701105158</created>          <gmt_created>2023-11-27 17:12:38</gmt_created>          <changed>1701105263</changed>          <gmt_changed>2023-11-27 17:14:23</gmt_changed>      </item>          <item>          <nid>672450</nid>          <type>image</type>          <title><![CDATA[GTRI's  High School Internship Program Co-Directors]]></title>          <body><![CDATA[<p>High School Internship Program Co-Directors Erick Maxwell (far left) and Therese Boston (far right) pose with Georgia education partners Leon Grant III, founder and Director, The Engineering Pipeline at Marietta City Schools, and John Pierson, President of the Georgia Section of ASCE. (photo credit: Christopher J. Moore)</p>]]></body>                      <image_name><![CDATA[2023_1106_PHOTO_ICL_25th Anniversary STEM GTRI_135.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/11/27/2023_1106_PHOTO_ICL_25th%20Anniversary%20STEM%20GTRI_135.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/11/27/2023_1106_PHOTO_ICL_25th%20Anniversary%20STEM%20GTRI_135.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/11/27/2023_1106_PHOTO_ICL_25th%2520Anniversary%2520STEM%2520GTRI_135.JPG?itok=5V5SDuzv]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI's  High School Internship Program Co-Directors]]></image_alt>                    <created>1701105289</created>          <gmt_created>2023-11-27 17:14:49</gmt_created>          <changed>1701105384</changed>          <gmt_changed>2023-11-27 17:16:24</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="167258"><![CDATA[STEM]]></keyword>          <keyword tid="193305"><![CDATA[innovating the future]]></keyword>          <keyword tid="1432"><![CDATA[education]]></keyword>          <keyword tid="110861"><![CDATA[25th anniversary]]></keyword>          <keyword tid="183048"><![CDATA[K-12 outreach]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="671146">  <title><![CDATA[Largest Study of its Kind Shows Outdated Password Practices are Widespread]]></title>  <uid>32045</uid>  <body><![CDATA[<p>Three out of four of the world’s most popular websites are failing to meet minimum requirement standards and allowing tens of millions of users to create weak passwords. The findings are part of a new Georgia Tech cybersecurity study that examines the current state of password policies across the internet.</p><p>Using a first-of-its-kind automated tool that can assess a website’s password creation policies, researchers also discovered that 12% of websites completely lacked password length requirements.</p><p>Assistant Professor&nbsp;<strong>Frank Li</strong>&nbsp;and Ph.D. student&nbsp;<strong>Suood Al Roomi</strong>&nbsp;in Georgia Tech’s&nbsp;<a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a>&nbsp;created the automated assessment tool to explore all sites in the&nbsp;<a href="https://developer.chrome.com/docs/crux">Google Chrome User Experience Report</a>&nbsp;(CrUX), a database of one million websites and pages. &nbsp;</p><p>Li and Al Roomi's method of inferring password policies succeeded on over&nbsp;20,000 sites in the database and showed that many sites:</p><ul><li>Permit very short passwords</li><li>Do not block common passwords</li><li>Use outdated requirements like complex characters</li></ul><p>The researchers also discovered that only a few sites fully follow standard guidelines, while most stick to outdated guidelines from 2004. The project was 135 times larger than previous works that relied on manual methods and smaller sample sizes.</p><p>More than half of the websites in the study accepted passwords with six characters or less, with 75% failing to require the recommended eight-character minimum. Around 12% of had no length requirements, and 30% did not support spaces or special characters.</p><p>Only 28% of the websites studied enforced a password block list, which means thousands of sites are vulnerable to cyber criminals who might try to use common passwords to break into a user’s account, also known as a password spraying attack.</p><p>“Both Professor Li and I were excited to take on the challenge,” said Al Roomi. “With his guidance and our continuous work on both algorithm design and the measurement technique, we were able to fully develop an automated measurement of password creation policy and apply it at scale.”</p><p>Al Roomi and Li designed an algorithm that automatically determines a website’s password policy. With the help of machine learning, the pair could see the consistency of length requirements and restrictions for numbers, upper- and lower-case letters, special symbols, combinations, and starting letters. They could also see if sites permitted dictionary words or known breached passwords.</p><p>“As a security community, we've identified and developed various solutions and best practices for improving internet and web security,” said Li. “It's crucial that we investigate whether those solutions or guidelines are actually adopted in practice to understand whether security is improving in reality.”</p><p>The project began during the height of the pandemic when Al Roomi found a gap in the research literature surrounding website password policies. Through his reading, he discovered that a consensus of his peers did not think a large-scale survey of password policies was possible due to the variety of web design.</p><p>“It was exciting to see an identified challenge in the literature and to develop and apply a vision we turned into the measurement tool,” said Al Roomi. “This research was my first in my Ph.D. program at Georgia Tech and SCP. It is one of the most challenging yet rewarding endeavors I've worked on.”</p><p>The full report will be presented at the&nbsp;<a href="https://www.sigsac.org/ccs/CCS2023/index.html">ACM Conference on Computer and Communications Security (CCS)</a>&nbsp;in Copenhagen, Denmark, later this month.&nbsp;<a href="https://www.usenix.org/conference/usenixsecurity23/presentation/al-roomi"><em>A Large-Scale Measurement of Website Login Policies</em></a>&nbsp;was also accepted to the 32nd USENIX Security Symposium earlier this year.</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1700247760</created>  <gmt_created>2023-11-17 19:02:40</gmt_created>  <changed>1701048461</changed>  <gmt_changed>2023-11-27 01:27:41</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers have developed a first-of-its-kind automated measurement tool that can assess password protection policies across the internet. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers have developed a first-of-its-kind automated measurement tool that can assess password protection policies across the internet. ]]></sentence>  <summary><![CDATA[<p>Georgia Tech cybersecurity researchers have developed a first-of-its-kind automated measurement tool that can assess password protection policies across the internet. The team used the tool in the largest study of its kind to assess password protection policies for 20,000 of the world's top websites. The results of their study are being published at the&nbsp;&nbsp;<a href="https://www.sigsac.org/ccs/CCS2023/index.html">ACM Conference on Computer and Communications Security (CCS)</a>&nbsp;in Copenhagen, Denmark, later this month.</p>]]></summary>  <dateline>2023-11-17T00:00:00-05:00</dateline>  <iso_dateline>2023-11-17T00:00:00-05:00</iso_dateline>  <gmt_dateline>2023-11-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>JP Popham</p><p>Communications Officer</p><p>School of Cybersecurity and Privacy</p><p>john.popham@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672410</item>      </media>  <hg_media>          <item>          <nid>672410</nid>          <type>image</type>          <title><![CDATA[A stock composite image of a man working at a computer screen with an animated unlocked lock image hovering above the screen and elsewhere around his desk]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CyberSecurity_StockPhoto.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/11/17/CyberSecurity_StockPhoto.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/11/17/CyberSecurity_StockPhoto.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/11/17/CyberSecurity_StockPhoto.jpeg?itok=UXPZYXV7]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A stock composite image of a man working at a computer screen with an animated unlocked lock image hovering above the screen and elsewhere around his desk]]></image_alt>                    <created>1700247771</created>          <gmt_created>2023-11-17 19:02:51</gmt_created>          <changed>1700247771</changed>          <gmt_changed>2023-11-17 19:02:51</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="671156">  <title><![CDATA[Researchers Break Apple’s New MacBook Pro Weeks After Release]]></title>  <uid>32045</uid>  <body><![CDATA[<p>A Georgia Tech researcher has successfully evaded security measures on Apple’s latest MacBook Pro with the M3 processor chip to capture his fictional target’s Facebook password and second-factor authentication text.</p><p>By the end of his demonstration video, Ph.D. student&nbsp;<strong>Jason Kim</strong>&nbsp;showed how the recently discovered iLeakage side-channel exploit is still a genuine threat to Apple devices, regardless of how updated their software might be.</p><p>First discovered by Kim and&nbsp;<strong>Daniel Genkin</strong>, an associate professor in the&nbsp;<a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a>, the vulnerability affects all recent iPhones, iPads, laptops, and desktops produced by Apple since 2020.</p><p>iLeakage allows attackers to see what’s happening on their target’s Safari browser. This vulnerability allows potential access to Instagram login credentials, Gmail inboxes, and YouTube watch histories, as Kim demonstrated last month on a slightly older MacBook Pro.</p><p><strong>“</strong>A remote attacker can deploy iLeakage by hosting a malicious webpage they control, and a target just needs to visit that webpage,” said Kim. “Because Safari does not properly isolate webpages from different origins, the attacker's webpage is able to coerce Safari to put the target webpage in the same address space. The attacker can use speculative execution to subsequently read arbitrary secrets from the target page.”</p><p>How is this possible? Well, as manufacturers developed faster and more efficient CPUs, their devices have become vulnerable to something called speculative execution attacks. This vulnerability is in the design of the chip itself. It has led to major software issues since the Spectre attack was reported in 2018.</p><p>There have been many attempts to stop these types of attacks, but Kim and Genkin show through their&nbsp;<a href="https://architecture.fail/">research</a>&nbsp;that more work still needs to be done.</p><p>“iLeakage shows these attacks are still relevant and exploitable, even after nearly six years of Spectre mitigation efforts following its discovery,” said Genkin. “Spectre attacks coerce CPUs into speculatively executing the wrong flow of instructions. We have found that this can be used in several different environments, including Google Chrome and Safari.”</p><p>The team made Apple aware of its findings on Sept. 12, 2022. Since then, the tech company has issued mitigation for iLeakage in Safari. However, the researchers note that the update was not initially enabled by default. It was only compatible with macOS Ventura 13.0 and higher as of today.</p><p>So far, the team does not have evidence that real-world cyber-attackers have used iLeakage. They‘ve determined that iLeakage is a significantly difficult attack to orchestrate end-to-end, requiring advanced knowledge of browser-based side-channel attacks and Safari's implementation.</p><p>The vulnerability is confined to the Safari web browser on macOS because the exploit leverages peculiarities unique to Safari's JavaScript engine. However, iOS users face a different situation due to the sandboxing policies on Apple's App Store. The policies require other browser apps using iOS to use Safari's JavaScript engine, making nearly every browser application listed on the App Store vulnerable to iLeakage.</p><p><a href="https://ileakage.com/"><em>iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices</em></a>&nbsp;will be published at the&nbsp;<a href="https://www.sigsac.org/ccs/CCS2023/index.html">2023 ACM SIGSAC Conference on Computer and Communications Security</a>&nbsp;later this month.</p><p>Along with Kim and Genkin,&nbsp;<strong>Stephan van Schaik</strong>&nbsp;of the University of Michigan and&nbsp;<strong>Yuval Yarom</strong>&nbsp;of Ruhr University Bochum co-authored the paper.</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1700491704</created>  <gmt_created>2023-11-20 14:48:24</gmt_created>  <changed>1700491990</changed>  <gmt_changed>2023-11-20 14:53:10</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech cybersecurity and privacy researchers have uncovered a significant threat that exploits a vulnerability in the Safari web browser]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech cybersecurity and privacy researchers have uncovered a significant threat that exploits a vulnerability in the Safari web browser]]></sentence>  <summary><![CDATA[<p>Georgia Tech cybersecurity and privacy researchers have uncovered a significant threat that exploits a vulnerability in the Safari web browser. The vulnerability affects all recent iPhones, iPads, laptops, and desktops produced by Apple since 2020.The research team is presenting its findings at&nbsp;the&nbsp;<a href="https://www.sigsac.org/ccs/CCS2023/index.html">2023 ACM SIGSAC Conference on Computer and Communications Security</a>&nbsp;later this month.</p>]]></summary>  <dateline>2023-11-20T00:00:00-05:00</dateline>  <iso_dateline>2023-11-20T00:00:00-05:00</iso_dateline>  <gmt_dateline>2023-11-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>JP Popham</p><p>Communications Officer</p><p>School of Cybersecurity &amp; Privacy</p><p>john.popham@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672411</item>      </media>  <hg_media>          <item>          <nid>672411</nid>          <type>image</type>          <title><![CDATA[Associate Professor Daniel Genkin and Ph.D. student Jason Kim from Georgia Tech's School of Cybersecurity and Privacy]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Genkin and Kim web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/11/20/Genkin%20and%20Kim%20web.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/11/20/Genkin%20and%20Kim%20web.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/11/20/Genkin%2520and%2520Kim%2520web.jpg?itok=p6d5ZdwK]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Associate Professor Daniel Genkin and Ph.D. student Jason Kim from Georgia Tech's School of Cybersecurity and Privacy]]></image_alt>                    <created>1700491713</created>          <gmt_created>2023-11-20 14:48:33</gmt_created>          <changed>1700491713</changed>          <gmt_changed>2023-11-20 14:48:33</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="670493">  <title><![CDATA[Learning Never Stops for Alan Nussbaum ]]></title>  <uid>35832</uid>  <body><![CDATA[<div><div><div><div><h3>As GTRI Principal Research Engineer Alan Nussbaum can tell you, the value of an education never gets old.&nbsp;</h3><p>At 72 years old, Nussbaum recently earned his Ph.D. from the Georgia Institute of Technology (Georgia Tech) in computer science with a minor in electrical engineering. Although the degree took him 11 years to complete, Nussbaum said the concepts he learned and the lifelong relationships he formed made it all worth it.&nbsp;</p><p>Close to half of all doctoral recipients in the U.S. are 26 to 30 years old, while just 7% are over 45, according to recent data from the <a href="https://ncses.nsf.gov/pubs/nsf23300/data-tables"><strong>National Science Foundation</strong></a>. But it can be beneficial taking on the Ph.D. later in life.</p><p>“Getting a Ph.D. was hard,” Nussbaum said. “But I’m glad I did it at this stage in my life because I was able to apply more life experiences to my coursework and research, which was rewarding.”</p><div><div><div><div><p>Nussbaum’s Ph.D. research focused on improving signal processing to provide better information to radar systems about sudden changes in a target’s velocity and acceleration. To do this, Nussbaum used a specific algorithm known as an expectation-maximization (EM) algorithm, which can calculate unknown variables, such as velocity and acceleration, with exceptional accuracy, and is also a scalable and cost-effective solution for radar signal processing.</p><p>“This is a new way of doing signal processing in real time to achieve higher fidelity tracking results,” Nussbaum said.</p><p>Nussbaum has had an extensive career in the defense space, including working for Northrop Grumman and Raytheon Technologies as a technical software manager before joining GTRI’s Sensors and Electromagnetic Applications (SEAL) Laboratory in 2010. Nussbaum has had the goal of earning a Ph.D. since 1981, when he earned a master’s degree in computer science, but was working for Northrop Grumman outside of Boston at the time, and was unable to take time out of the workday to travel into the city to attend school.</p><div><div><div><div><p>Nussbaum chose to work for GTRI because it gave him the flexibility to be more creative with the research he performed for sponsors and its commitment to advanced education meant he wouldn’t have to put his career on hold to go back to school. "Working at GTRI made getting my Ph.D., which would have been very difficult anywhere else, manageable,” he said.</p><p>As a Ph.D. student, Nussbaum sought to balance the demands of work, school, and family by taking as many early-morning classes as possible, and then after work, he would spend nights attending any remaining classes or doing coursework.</p><p>“I had to learn to super-organize my time and keep both school and work moving in the right direction,” Nussbaum said.</p><p>Nussbaum most enjoyed learning about several advanced computer science concepts throughout the program, which were a nice complement to the radar research he was performing at GTRI, but said taking tests could be challenging at times.</p><p>“I understood my course materials but being older than 65 years old, and my work responsibilities, affected my memory,” he added.</p><div><div><div><div><div><div><p>Nussbaum also enjoyed building relationships with the other students in his program and his advisor, Kishore Ramachandran, a professor in the College of Computing and School of Computer Science.&nbsp;</p><p>Ramachandran, who has expertise in distributed and real-time computing systems, described Nussbaum as an accomplished yet humble individual who brought an impressive amount of industry knowledge and experience to the program.&nbsp;</p><p>“It was such a joy working with Alan,” Ramachandran said. “Because of his seniority and background, he became an integral part of my research group. At the same time, he was not the type to brag about all of his accomplishments, but was eager to learn from the other students who were considerably younger than him.”</p><p>GTRI Principal Research Engineers Dale Blair and Byron Keel also played a key role in supporting Nussbaum during his Ph.D. journey. Blair served as Nussbaum's co-advisor and supported the target tracking aspects of his research while Keel supported the signal processing portions of the research. <span>Their knowledge and algorithm verification, combined with Nussbaum's software engineering experience, ensured the achievement of all the research’s functional and real-time performance goals.</span></p><p>Right now, Nussbaum, who is based in Lexington, Massachusetts, and works out of GTRI’s New England Field Office, said he is enjoying spending time with family, including his four grandchildren. Looking ahead, he plans to continue growing his division at GTRI and utilizing his research on future radar applications.</p><p>Nussbaum said he is grateful for the professional and personal support he received throughout his Ph.D. journey. To anyone who might also be considering taking a professional or personal leap of faith, Nussbaum said the path might not always be linear or easy, but it will almost always be worth it.</p><p>“If you are willing to maintain the commitment for many years and understand the required process, the feeling is very good when you are completed,” he said.</p><p>&nbsp;</p><p>Writer: <a href="mailto:anna.akins@gtri.gatech.edu">Anna Akins</a>&nbsp;(anna.akins@gtri.gatech.edu)<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>The <a href="https://gtri.gatech.edu">Georgia Tech Research Institute (GTRI)</a> is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $940 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1697643176</created>  <gmt_created>2023-10-18 15:32:56</gmt_created>  <changed>1697643466</changed>  <gmt_changed>2023-10-18 15:37:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[As GTRI Principal Research Engineer Alan Nussbaum can tell you, the value of an education never gets old. At 72 years old, Nussbaum recently earned his Ph.D. from Georgia Tech in computer science with a minor in electrical engineering. ]]></teaser>  <type>news</type>  <sentence><![CDATA[As GTRI Principal Research Engineer Alan Nussbaum can tell you, the value of an education never gets old. At 72 years old, Nussbaum recently earned his Ph.D. from Georgia Tech in computer science with a minor in electrical engineering. ]]></sentence>  <summary><![CDATA[<p><span><span>Close to half of all doctoral recipients in the U.S. are 26 to 30 years old, while just 7% are over 45, according to recent data from the <a href="https://ncses.nsf.gov/pubs/nsf23300/data-tables"><strong><span><span>National Science Foundation</span></span></strong></a>. But it can be beneficial taking on the Ph.D. later in life.<strong><span> </span></strong><span>As GTRI Principal Research Engineer Alan Nussbaum can tell you, the value of an education never gets old</span><strong><span>.&nbsp;</span></strong>At 72 years old, Nussbaum recently earned his Ph.D. from the Georgia Institute of Technology (Georgia Tech) in computer science with a minor in electrical engineering. Although the degree took him 11 years to complete, Nussbaum said the concepts he learned and the lifelong relationships he formed made it all worth it.&nbsp;</span></span></p>]]></summary>  <dateline>2023-10-18T00:00:00-04:00</dateline>  <iso_dateline>2023-10-18T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-10-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>672079</item>          <item>672078</item>      </media>  <hg_media>          <item>          <nid>672079</nid>          <type>image</type>          <title><![CDATA[GTRI Team with GTRI's Angry Kitten® electronic attack system]]></title>          <body><![CDATA[<p>Nussbaum and members of his software division pictured with GTRI's Angry Kitten® electronic attack system that they developed. Angry Kitten® was first developed in 2013 and utilizes advanced sensing and attack techniques to combat the most modern sensor systems. Several versions of the Angry Kitten® technology are utilized across the DoD (Photo Credit: Sean McNeil, GTRI).</p>]]></body>                      <image_name><![CDATA[Alan-Nussbaum_feature_class.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/10/18/Alan-Nussbaum_feature_class.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/10/18/Alan-Nussbaum_feature_class.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/10/18/Alan-Nussbaum_feature_class.jpg?itok=53p1SrF8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI Team with GTRI's Angry Kitten® electronic attack system]]></image_alt>                    <created>1697642947</created>          <gmt_created>2023-10-18 15:29:07</gmt_created>          <changed>1697643024</changed>          <gmt_changed>2023-10-18 15:30:24</gmt_changed>      </item>          <item>          <nid>672078</nid>          <type>image</type>          <title><![CDATA[GTRI Researcher Alan Nussbaum]]></title>          <body><![CDATA[<p>Alan Nussbaum (left) with his Ph.D. advisor, Kishore Ramachandran (right), a professor in Georgia Tech’s College of Computing and School of Computer Science. They are pictured in the courtyard of the H. Milton Stewart School of Industrial and Systems Engineering. (Photo by Sean McNeil)</p>]]></body>                      <image_name><![CDATA[Alan Nussbaum_Feature_GT Campus02.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/10/18/Alan%20Nussbaum_Feature_GT%20Campus02.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/10/18/Alan%20Nussbaum_Feature_GT%20Campus02.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/10/18/Alan%2520Nussbaum_Feature_GT%2520Campus02.jpg?itok=4TwkpsXU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI Researcher Alan Nussbaum]]></image_alt>                    <created>1697642741</created>          <gmt_created>2023-10-18 15:25:41</gmt_created>          <changed>1697642865</changed>          <gmt_changed>2023-10-18 15:27:45</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="169432"><![CDATA[signal processing]]></keyword>          <keyword tid="193186"><![CDATA[Alan Nussbaum]]></keyword>          <keyword tid="1051"><![CDATA[Computer Science]]></keyword>          <keyword tid="192133"><![CDATA[developing technology leaders]]></keyword>          <keyword tid="193187"><![CDATA[advanced education]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="669481">  <title><![CDATA[Georgia Tech’s GaMEP is Driving Innovation Across Georgia]]></title>  <uid>36174</uid>  <body><![CDATA[<p>“A stitch in time saves nine,” goes the old saying. For a company in Georgia, that adage became very real when damage to a key piece of machinery threatened its operation. The group helping with the stitch in time was the <a href="https://gamep.org/">Georgia Manufacturing Extension Partnership (GaMEP)</a>, a program of Georgia Tech's <a href="https://innovate.gatech.edu/">Enterprise Innovation Institute</a>&nbsp;that — for more than 60 years — has been helping small- to medium-sized manufacturers in Georgia stay competitive and grow, boosting economic development across the state.</p><p>Silon US, a Peachtree City manufacturer that designs and produces engineered compounds used to create a wide range of products — from automotive applications to building materials, such as PEX piping and wire and cable, was experiencing problems with their extrusion line during a time of increasing customer demand. Problems with the drive mechanism on that extrusion line, a piece of equipment critical to the company’s ability to produce, threatened to shut them down. With replacement parts several weeks away, was it safe to continue operating? At what throughput rates? How much collateral damage might be incurred if they continued to operate?</p><p>That’s when Silon managers turned to GaMEP for help.</p><p>After working through ideas with GaMEP’s manufacturing experts, the team installed wireless condition monitoring sensors that provide continuous, real-time insights on their manufacturing assets’ health. With the sensors, Silon was able to find a sweet spot that not only allowed them to continue operating but also kept them from overexerting the equipment, preventing further damage.</p><p>The solution to that problem has now become a routine part of Silon’s process, as company technicians continue to use this sensor technology for early detection of any deviations or anomalies in the machinery’s health, allowing the company’s maintenance team to proactively respond by adjusting scheduled maintenance to avoid costly downtime.</p><p>GaMEP’s Sean Madhavaraman says, “Silon is more productive than ever and on track for growth. The strong results in this challenge are a great example of the decades-long focus of GaMEP to educate and train managers and employees in best practices, to develop and implement the latest technology, and to work together with businesses to find solutions.”</p><p>Daniel Raubenheimer and Matt Gammon, Silon’s general managers, also lauded GaMEP, saying, “GaMEP’s extensive experience within the manufacturing realm has been a great benefit to our company. The wireless condition monitoring sensors allow us to predict future breakdowns and mitigate a potential catastrophe — allowing us to operate in a safe manner, while saving money, time, and effort.”</p>]]></body>  <author>Blair Meeks</author>  <status>1</status>  <created>1694010002</created>  <gmt_created>2023-09-06 14:20:02</gmt_created>  <changed>1696554222</changed>  <gmt_changed>2023-10-06 01:03:42</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech faculty members are working with manufacturers in Georgia to solve problems and introduce innovations that help ensure manufacturing stays strong and advances in the state.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech faculty members are working with manufacturers in Georgia to solve problems and introduce innovations that help ensure manufacturing stays strong and advances in the state.]]></sentence>  <summary><![CDATA[<p>The Georgia Manufacturing Extension Partnership (GaMEP) is&nbsp;a&nbsp;Georgia Tech&nbsp;program&nbsp;that&nbsp;—&nbsp;for&nbsp;more than 60 years&nbsp;—&nbsp;has been helping small-&nbsp;to medium-sized manufacturers in Georgia stay competitive and grow, boosting economic development across the state. GaMEP's collaboration with Silon, a manufacturer in Peachtree City, during a crisis has resulted in a solution that has the company operating more efficiently than ever, protecting jobs and maximizing performance.&nbsp;</p>]]></summary>  <dateline>2023-09-06T00:00:00-04:00</dateline>  <iso_dateline>2023-09-06T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-09-06 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Georgia Tech experts advise small-to-medium sized manufacturers on tech that will help them thrive]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[Blair.Meeks@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Blair Meeks</p><p>Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671631</item>          <item>671632</item>          <item>671630</item>      </media>  <hg_media>          <item>          <nid>671631</nid>          <type>image</type>          <title><![CDATA[Sean_04.jpg]]></title>          <body><![CDATA[<p>Sean Madhavaraman, a leader at GaMEP, examines work product at Silon in Peachtree City, Georgia</p>]]></body>                      <image_name><![CDATA[Sean_04.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/09/06/Sean_04_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/09/06/Sean_04_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/09/06/Sean_04_1.jpg?itok=U7SKPPap]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[This image shows Sean Madhavaraman, one of the leaders at GaMEP examining work product at Silon in Peachtree City, Georgia.]]></image_alt>                    <created>1694034150</created>          <gmt_created>2023-09-06 21:02:30</gmt_created>          <changed>1694034150</changed>          <gmt_changed>2023-09-06 21:02:30</gmt_changed>      </item>          <item>          <nid>671632</nid>          <type>image</type>          <title><![CDATA[Team_03.jpg]]></title>          <body><![CDATA[<p>Lead technician, Austin Hicks, taps on a monitoring screen while his co-worker looks on at the manufacturing facility for Silon in Peachtree City, Georgia</p>]]></body>                      <image_name><![CDATA[Team_03.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/09/06/Team_03_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/09/06/Team_03_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/09/06/Team_03_1.jpg?itok=Y5BSGR2B]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[This image shows technicians at Silon working a monitoring screen at their manufacturing facility]]></image_alt>                    <created>1694034150</created>          <gmt_created>2023-09-06 21:02:30</gmt_created>          <changed>1694034150</changed>          <gmt_changed>2023-09-06 21:02:30</gmt_changed>      </item>          <item>          <nid>671630</nid>          <type>video</type>          <title><![CDATA[Georgia Tech’s GaMEP is Driving Innovation in Manufacturing Across Georgia]]></title>          <body><![CDATA[<p>The Georgia Manufacturing Extension Partnership (GaMEP) is a Georgia Tech program that — for more than 60 years — has been helping small- to medium-sized manufacturers in Georgia stay competitive and grow, boosting economic development across the state. GaMEP's collaboration with Silon, a manufacturer in Peachtree City, during a crisis has resulted in a solution that has the company operating more efficiently than ever, protecting jobs and maximizing performance.</p>]]></body>                      <youtube_id><![CDATA[kywY_WGr_q8]]></youtube_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <vimeo_id><![CDATA[]]></vimeo_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <video_url><![CDATA[https://youtu.be/kywY_WGr_q8]]></video_url>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>                    <created>1694033988</created>          <gmt_created>2023-09-06 20:59:48</gmt_created>          <changed>1694033988</changed>          <gmt_changed>2023-09-06 20:59:48</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="38351"><![CDATA[Advanced Manufacturing]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="182666"><![CDATA[Internet of Things for Manufacturing]]></keyword>      </keywords>  <core_research_areas>          <term tid="39461"><![CDATA[Manufacturing, Trade, and Logistics]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="669968">  <title><![CDATA[New Resource for Domestic Abuse Survivors Combines AI, Cybersecurity, and Psychology]]></title>  <uid>36253</uid>  <body><![CDATA[<p>Georgia Tech researchers are working to create a new software tool powered by artificial intelligence (AI) to address the under-researched area of digital security and domestic abuse.</p><p>These areas frequently overlap with abusers often using the internet and mobile technology to extend the reach of their abuse. However, the smaller scale of these online attacks has resulted in less attention from security researchers.</p><p>By building on developments recently made in cognitive security, Principal Research Scientist&nbsp;<strong>Courtney Crooks</strong>&nbsp;and graduate student&nbsp;<strong>Sneha Talwalkar</strong>&nbsp;are working to bring relief to survivors of domestic abuse.</p><p>The impact of domestic abuse, otherwise called intimate partner violence (IPV), on public health is something that Crooks has been studying for several years through research and practice in her role as a licensed psychologist and researcher.</p><p>After seeing how new technology opened new methods of abuse online, Crooks realized she could help fill in the gaps in this research space using her experience working with the Georgia Tech Research Institute, the&nbsp;<a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a>&nbsp;(SCP) at Georgia Tech, and the&nbsp;<a href="https://med.emory.edu/">Emory University School of Medicine</a>.</p><p>To get what they want, abusers try to change their victim’s state of mind through cognitive manipulation and use different tactics to do so. Crooks decided to explore ways to help IPV survivors counteract these enhanced technology-enabled cognitive security risks as they progressed through their recovery.</p><p>The software Crooks and Talwalkar are working to develop would alert survivors to these potential or observed abuses by leveraging well-known, developmentally appropriate, psychologically based learning strategies. The tool will focus solely on the unique risks faced by IPV survivors. Applying human-centered design principles and ethical standards to the AI design will be a top priority for the team.</p><p>The team is working to develop AI-assisted interventions that are psychologically informed and made specifically to focus on the unique risks faced by survivors. These interventions will be designed to take place alongside traditional methods of support, such as mental health and community resources.</p><p>“It’s important to understand that abusive relationships are complicated. While some people can escape them, many can’t,” said Crooks. “Or they may physically escape, but resources like their phones, online accounts, or finances may still be vulnerable to their abusers. Survivors may also need to continue to communicate with their abuser, like in instances in which they share children.”</p><p>Regardless of circumstances, it is often difficult for survivors to stop communicating with their abusers once they escape the relationship. This inability to disconnect is because of the psychological connections reinforced while they were with their former partner.</p><p>The AI technologies Crooks and Talwalkar propose will not act like a ChatGPT chatbot. Instead, it will act like a coach, learning from abusive behavior tactics and potential survivor responses.</p><p>The tool will then make suggestions based on each user’s specific recovery progress and goals while factoring in potential risks. To improve its coaching performance and general knowledge base, the AI will continue to learn from the outcome of each incident survivors face.</p><p>“The model provides the necessary intervention to assist in the recovery of an IPV survivor,” said Talwalkar. “We want to use artificial intelligence for good, and this project is a step in that direction.”</p><p>The classes in the SCP master’s program played a pivotal role in shaping Talwalkar’s research in this area. While exploring internet censorship and language models, she recognized the emerging challenges posed by AI in security. After an insightful conversation with SCP Professor Peter Swire, Talwalkar gained the confidence to shift her focus towards investigating malicious intent in immersive environments. With Crooks’ guidance, she began exploring the socio-technical environment of IPV.</p><p><em>Designing User-Centered Artificial Intelligence to Assist in Recovery from Domestic Abuse</em>&nbsp;was accepted as an extended abstract and presented to the 2023 World Congress Computer Science, Computer Engineering, and Applied Computing event this summer. Proceedings of the IEEE is publishing the work in an upcoming issue. &nbsp;</p><p>In May, Crooks, Talwalkar, and others from their research team presented their findings at the Health Sciences Research Day hosted on the Emory University campus by the Emory School of Medicine. Crooks presented her study of the lived experience of coercive control in domestic abuse, from which this current research is derived, at the February 2023 National Meeting of the American Psychoanalytic Association.&nbsp;</p><p>October is&nbsp;<a href="https://www.acf.hhs.gov/ofvps/fact-sheet/october-domestic-violence-awareness-month" target="_blank">National Domestic Violence Awareness Month</a>&nbsp;and National&nbsp;<a href="https://staysafeonline.org/programs/cybersecurity-awareness-month/" target="_blank">Cybersecurity Awareness Month</a>. For more information about domestic abuse and resources to help, please visit the&nbsp;<a href="https://www.cdc.gov/violenceprevention/intimatepartnerviolence/index.html" target="_blank">Centers for Disease Control and Prevention website</a>.</p>]]></body>  <author>jpopham3</author>  <status>1</status>  <created>1695823879</created>  <gmt_created>2023-09-27 14:11:19</gmt_created>  <changed>1695921600</changed>  <gmt_changed>2023-09-28 17:20:00</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Cybersecurity master’s student Sneha Talwalkar and GTRI Principal Research Scientist Courtney Crooks are working to build the framework of an AI tool with the goal of providing support and protection to domestic abuse survivors.]]></teaser>  <type>news</type>  <sentence><![CDATA[Cybersecurity master’s student Sneha Talwalkar and GTRI Principal Research Scientist Courtney Crooks are working to build the framework of an AI tool with the goal of providing support and protection to domestic abuse survivors.]]></sentence>  <summary><![CDATA[<p>Cybersecurity master’s student Sneha Talwalkar and GTRI Principal Research Scientist Courtney Crooks are working to build the framework of an AI tool with the goal of providing support and protection to domestic abuse survivors. Their premise for this project is the area of cognitive security has been under studied when it comes to intimate partner violence. In other words, abusers often use the internet as well as other electronic tools to extend the reach of their abuse. Having an AI based tool to help survivors through the recovery process and protect them from potential attacks would have a tremendous societal impact.</p>]]></summary>  <dateline>2023-09-27T00:00:00-04:00</dateline>  <iso_dateline>2023-09-27T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-09-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jpopham3@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<div><div><p><span><span><span><span><span><span><span><span><span><strong><span><span>JP Popham&nbsp;</span></span></strong></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span><span>Communications Officer | School of Cybersecurity and Privacy</span></span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span><span>Georgia Institute of Technology</span></span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span><span>Desk: (404) 894-6260</span></span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span><span><a href="mailto:jpopham3@gatech.edu" target="_blank" title="mailto:jpopham3@gatech.edu">jpopham3@gatech.edu</a>&nbsp;|&nbsp;scp.cc.gatech.edu</span></span></span></span></span></span></span></span></span></span></span></p></div></div>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671850</item>      </media>  <hg_media>          <item>          <nid>671850</nid>          <type>image</type>          <title><![CDATA[New Resource for Domestic Abuse Survivors Combines AI, Cybersecurity, and Psychology]]></title>          <body><![CDATA[<p>Cybersecurity master's student <strong>Sneha Talwalkar (left) </strong>and<strong> </strong>GTRI Principal Research Scientist <strong>Courtney Crooks</strong> (right) are working to bring relief to survivors of domestic abuse by building on developments recently made in cognitive security. <em>(Photos by Kevin Beasley/College of Computing)</em></p>]]></body>                      <image_name><![CDATA[Dr. Courtney Crooks - Sneha Talwalkar_86A0044.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/09/27/Dr.%20Courtney%20Crooks%20-%20Sneha%20Talwalkar_86A0044.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/09/27/Dr.%20Courtney%20Crooks%20-%20Sneha%20Talwalkar_86A0044.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/09/27/Dr.%2520Courtney%2520Crooks%2520-%2520Sneha%2520Talwalkar_86A0044.jpg?itok=2L-73zSD]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Two women standing in front of bookshelves ]]></image_alt>                    <created>1695822641</created>          <gmt_created>2023-09-27 13:50:41</gmt_created>          <changed>1695823703</changed>          <gmt_changed>2023-09-27 14:08:23</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="344"><![CDATA[cyber]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="174386"><![CDATA[cyberabuse]]></keyword>          <keyword tid="87031"><![CDATA[domestic abuse]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="122821"><![CDATA[cognitive psychology]]></keyword>          <keyword tid="4200"><![CDATA[cognitive]]></keyword>          <keyword tid="191634"><![CDATA[school of cybersecurity and privacy]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="191486"><![CDATA[a GTRI principal research engineer]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668605">  <title><![CDATA[Avant South set for September 28-29]]></title>  <uid>36418</uid>  <body><![CDATA[<p><span><span>As part of an effort to position the Institute as a convener of people,&nbsp;ideas, and conversations&nbsp;surrounding the world’s most&nbsp;important technological issues, Georgia Tech will host its inaugural Avant South event <a>Sept. 28 – 29</a>. Each year, Avant South will welcome innovators and diverse voices&nbsp;to Atlanta to discuss and explore&nbsp;a different theme related to technological advancements and their impact, based on emerging trends and issues.​ </span></span></p><p><span><span><span><span><span>This year’s theme will center on AI and responsible stewardship.</span></span>&nbsp;<span>It will feature keynote speakers, breakout&nbsp;sessions, panel discussions, networking opportunities, and an expo&nbsp;showcasing research and real-life applications of AI.​ <span><span>The goal is to create an experience for all levels of professionals and entrepreneurs where they can come to Georgia Tech and interact with speakers, researchers, and industry leaders.</span></span></span></span></span></span></p><p><span><span>​</span></span><span><span>Topics will include AI in education, healthcare, arts and culture, and industry, as well as the role of regulatory and governmental oversight. At the Street Innovation Showcase, located in Tech Square and the Coda courtyard, students and faculty from universities and colleges across metro Atlanta, along with corporations, will present their research and applications of AI.&nbsp;The showcase is free and open to the public.</span></span></p><p>Avant South is part of <a href="https://www.innovatl2023.com/#overview" rel="noreferrer noopener" target="_blank">InnovATL</a>, a citywide platform that amplifies the voices of metro Atlanta entrepreneurs, innovators, and creators. This year’s edition is scheduled to take place during the first week of a monthlong celebration of Atlanta’s innovation ecosystem — between Venture Atlanta, one of the nation’s largest venture capital conferences, and the AC3 Festival, which honors hip-hop culture and the city’s impact in music, technology, and entertainment.&nbsp;&nbsp;</p><p><span><span><span>The event kicks off the evening of Thursday, Sept. 28, with Southern Hospitality, a dinner on the Coda rooftop. Charles Isbell, ICS 1990, former dean of Georgia Tech’s College of Computing and currently the provost and vice chancellor for Academic Affairs at the University of Wisconsin-Madison, will be the featured speaker.&nbsp;</span></span></span></p><p><span><span>On Friday, Sept. 29, César A. Hidalgo, director of the Center for Collective Learning at the Artificial and Natural Intelligence Institute at the University of Toulouse, will be the morning keynote speaker. The lunch keynote is Kathy Baxter, PSY 1996, M.S. PSY 1998, and principal architect of responsible AI and tech at Salesforce. There will be a fireside chat with Tom Gruber, <span><span><span>co-founder and head of design for the company that created Siri, </span></span></span>to wrap up Avant South. Rose Scott from 90.1 WABE will be a host and moderator throughout day two, which will take place at the Fox Theatre.&nbsp;</span></span></p><p><span><span>“Avant South will showcase Georgia Tech as a trusted public voice that informs decision-makers in business, academia, and public policy on issues of consequence,” said President Ángel Cabrera. “We want to cement our role as the go-to institution for finding solutions for global challenges, and I can’t think of a more timely or urgent topic than m<span>anaging the impact of AI on society and making ethical and responsible decisions about how to use and create this technology.”</span></span></span></p><p><span><span><a>For more information, including a list of top presenters, visit </a><a href="https://avantsouth.com/">avantsouth.com</a>. </span></span></p>]]></body>  <author>sgagliano3</author>  <status>1</status>  <created>1690381563</created>  <gmt_created>2023-07-26 14:26:03</gmt_created>  <changed>1694612219</changed>  <gmt_changed>2023-09-13 13:36:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[For two days in September, Georgia Tech will bring together experts and thought leaders across multiple fields and disciplines to explore the theme of creating and using AI responsibly. ]]></teaser>  <type>news</type>  <sentence><![CDATA[For two days in September, Georgia Tech will bring together experts and thought leaders across multiple fields and disciplines to explore the theme of creating and using AI responsibly. ]]></sentence>  <summary><![CDATA[<p>For two days in September, Georgia Tech will bring together experts and thought leaders across multiple fields and disciplines to explore the theme of creating and using AI responsibly. Registration is open at <a href="https://avantsouth.com">www.avantsouth.com</a>.</p>]]></summary>  <dateline>2023-09-13T00:00:00-04:00</dateline>  <iso_dateline>2023-09-13T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-09-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[For two days in September, Georgia Tech will bring together experts and thought leaders across multiple fields and disciplines to explore the theme of creating and using AI responsibly. ]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[bzimmerman@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:bzimmerman@gatech.edu">Brice Zimmerman</a> -&nbsp;Assistant Director for Social Media and Thought Leadership</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671688</item>      </media>  <hg_media>          <item>          <nid>671688</nid>          <type>image</type>          <title><![CDATA[Avant_South_NC.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Avant_South_NC.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/09/13/Avant_South_NC.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/09/13/Avant_South_NC.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/09/13/Avant_South_NC.jpg?itok=ZQtkiUoW]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Avant South at Georgia Tech]]></image_alt>                    <created>1694611608</created>          <gmt_created>2023-09-13 13:26:48</gmt_created>          <changed>1694611608</changed>          <gmt_changed>2023-09-13 13:26:48</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="130"><![CDATA[Alumni]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="132"><![CDATA[Institute Leadership]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="130"><![CDATA[Alumni]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="132"><![CDATA[Institute Leadership]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="669538">  <title><![CDATA[Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users ]]></title>  <uid>32045</uid>  <body><![CDATA[<p>Lurking just under the surface of popular online applications like Dropbox and Discord is a threat lying in wait to infect users unlucky enough to cross its path.&nbsp;</p><p>Findings produced by Georgia Tech's Cyber Forensics Innovation (CyFI) Lab reveal this new type of menace, labeled as web-app-engaged (WAE) malware by the lab, has seen an increase of 226% since 2020. Fortunately, the team created a tool that enables cybersecurity incident responders to purge nearly 80% of discovered WAE malware by collaborating with service providers.&nbsp;</p><p>“Web applications have become an integral part of our online lives, offering various services such as content delivery, data storage, and social networking,” said&nbsp;<strong>Mingxuan Yao</strong>, Georgia Tech Ph.D. student. “Unfortunately, these utilities have made web applications an attractive playground for malware creators. WAE malware is designed to exploit these applications, posing several risks to users.”&nbsp;</p><p>WAE malware operates deceptively, though not in the ways one might expect. Rather than compromising the security of the web applications, this type of malware abuses the applications by making its malicious traffic appear benign. By doing so, it effectively hides in plain sight, enabling it to carry out its activities without being detected.&nbsp;</p><p>Addressing these threats requires a coordinated effort between incident responders and web app providers. Still, such collaboration has been lacking until now. The research produced by CyFI Lab seeks to enable such cooperation and provide insights into the prevalence and the characteristics of WAE malware.&nbsp;</p><p>Yao and his co-authors created Marsea to comprehensively examine WAE malware automatically. The tool identifies and separates abuse based on a web app’s identity and assets.&nbsp;</p><p>When used on a group of 10,000 malware samples, Marsea found nearly a thousand instances of malware throughout 29 different web applications. Alarmingly, Marsea also revealed that attackers are transitioning their malicious command-and-control servers to these web apps to evade detection. The research team has used Marsea to collaborate with web app providers to take down 79.8% of the malicious web app content.&nbsp;</p><p>In August, the team presented&nbsp;<a href="https://www.usenix.org/conference/usenixsecurity23/presentation/yao-mingxuan"><em>Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware</em></a>&nbsp;at the 32nd USENIX Security Symposium.&nbsp;<strong>Jonathan Fuller </strong>of the United States Military Academy, Georgia Tech Ph.D. students <strong>Ranjita Pai Kasturi</strong>,&nbsp;<strong>Saumya Agarwal</strong>,&nbsp;<strong>Amit Kumar Sikder</strong>, and Assistant Professor&nbsp;<strong>Brendan Saltaformaggio&nbsp;</strong>co-authored the paper.&nbsp;</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1694181148</created>  <gmt_created>2023-09-08 13:52:28</gmt_created>  <changed>1694529110</changed>  <gmt_changed>2023-09-12 14:31:50</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are working with service providers to take on new malware that disguises its malicious traffic as benign.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are working with service providers to take on new malware that disguises its malicious traffic as benign.]]></sentence>  <summary><![CDATA[<p>A new type of malware called WAE that hides in web applications has seen a dramatic increase in risks to users. Researchers at Georgia Tech's CyFI Lab have developed a tool to collaborate with service providers to remove 80% of discovered WAE malware, highlighting the need for coordinated efforts to address this hidden threat in popular online applications.</p><p>&nbsp;</p><p>&nbsp;</p>]]></summary>  <dateline>2023-09-08T00:00:00-04:00</dateline>  <iso_dateline>2023-09-08T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-09-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>John Popham, Communications Officer I</p><p>School of Cybersecurity &amp; Privacy</p><p>john.popham@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671648</item>      </media>  <hg_media>          <item>          <nid>671648</nid>          <type>image</type>          <title><![CDATA[Researchers from Georgia Tech's Cyber Forensics Innovation (CyFI) Lab discuss web application malware.]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CyFI Lab 4.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/09/08/CyFI%20Lab%204.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/09/08/CyFI%20Lab%204.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/09/08/CyFI%2520Lab%25204.png?itok=cRPuRDUS]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Researchers from Georgia Tech's Cyber Forensics Innovation (CyFI) Lab discuss web application malware.]]></image_alt>                    <created>1694181162</created>          <gmt_created>2023-09-08 13:52:42</gmt_created>          <changed>1694181162</changed>          <gmt_changed>2023-09-08 13:52:42</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="669540">  <title><![CDATA[New Tool Skewers Socially Engineered Attack Ads]]></title>  <uid>32045</uid>  <body><![CDATA[<p>"<em>Warning! Your computer is infected with a virus. Click the button below to take immediate action!</em>"</p><p>Online ads like this are all too familiar and often the opening salvo in personal cyberattacks that can lead to unwanted software or other malicious downloads.</p><p>Georgia Tech researchers are countering deceptive online ads with a pioneering solution designed to challenge the rising threat of online social engineering attacks by cutting them off at the source.</p><p>Trident, created by Ph.D. student&nbsp;<strong>Zheng Yang</strong>&nbsp;and his team of researchers, is an add-on compatible with Google Chrome that has proven to block these ads with nearly 100% efficiency.</p><p>Advertisements are fertile ground for scams and fraudulent schemes. While such networks may offer better pay to websites than industry giants like Google and Facebook, their advertisements often employ tactics that lure unsuspecting users into compromising situations.</p><p>“The goal is to identify suspicious ads that often take users to malicious websites or trigger unwanted software downloads,” said Yang. "Trident operates within Chrome’s developer tools and uses a sophisticated AI to assess potential threats."</p><p>The team compiled a vast dataset from over 100,000 websites to build Trident, including ten low-tier ad networks. This comprehensive data collection helped identify 1,479 instances of attacks encompassing a range of six common types of web-based social engineering attacks. These include:</p><ul><li>Tech-support scams</li><li>Unwanted software downloads</li><li>Scareware</li><li>Dating scams</li><li>Notification spam</li><li>Prize scams</li></ul><p>The remarkable outcome of their efforts is the sustained performance of Trident. Over the course of a year, the tool consistently achieved a nearly perfect detection rate of malicious ads, ensuring users' safety by minimizing the risk of interacting with harmful content.</p><p>Impressively, this achievement came with a meager 2.57% false positive rate, demonstrating the accuracy and effectiveness of Trident's machine-learning capabilities.</p><p><a href="https://www.usenix.org/conference/usenixsecurity23/presentation/yang-zheng"><em>TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks</em></a>&nbsp;was presented at the 32nd USENIX Security Symposium in August. Contributors to this project include Georgia Tech Ph.D. students&nbsp;<strong>Joey Allen</strong>&nbsp;and&nbsp;<strong>Matthew Landen</strong>, Adjunct Assistant Professor&nbsp;<strong>Roberto Perdisci</strong>, and Professor&nbsp;<strong>Wenke Lee</strong>.</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1694183277</created>  <gmt_created>2023-09-08 14:27:57</gmt_created>  <changed>1694183460</changed>  <gmt_changed>2023-09-08 14:31:00</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new tool developed at Georgia Tech is proving to be highly effective against online malicious ads.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new tool developed at Georgia Tech is proving to be highly effective against online malicious ads.]]></sentence>  <summary><![CDATA[<p>Georgia Tech researchers have developed Trident, a Google Chrome add-on that efficiently blocks deceptive online ads used in social engineering attacks, achieving nearly 100% accuracy in detecting and preventing malicious ads while maintaining a low false positive rate.</p>]]></summary>  <dateline>2023-09-06T00:00:00-04:00</dateline>  <iso_dateline>2023-09-06T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-09-06 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>John Popham, Communications Officer</p><p>School of Cybersecurity &amp; Privacy</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671649</item>      </media>  <hg_media>          <item>          <nid>671649</nid>          <type>image</type>          <title><![CDATA[A graphic depicting a pop-up ad blocker for the internet.]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[pop-up ads_blocker story.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/09/08/pop-up%20ads_blocker%20story.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/09/08/pop-up%20ads_blocker%20story.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/09/08/pop-up%2520ads_blocker%2520story.jpeg?itok=g5mpe1Sf]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A graphic depicting a pop-up ad blocker for the internet.]]></image_alt>                    <created>1694183287</created>          <gmt_created>2023-09-08 14:28:07</gmt_created>          <changed>1694183287</changed>          <gmt_changed>2023-09-08 14:28:07</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668994">  <title><![CDATA[‘Distilling’ Outdated Software Could Save Defense Dept. Millions in Time and Money]]></title>  <uid>27446</uid>  <body><![CDATA[<p>Software updates are a ubiquitous part of our lives.</p><p>That’s true at home and at work. And it’s true for the critical systems the U.S. Department of Defense relies on to protect the nation.</p><p>Think about all the highly sophisticated systems that power drones or fighter jets or even secure authentication programs. Many of those systems are custom software developed at great expense. Which means updating them isn’t as easy as downloading the latest software patch and clicking “Install.”</p><p>It often requires a time-consuming rewrite or reverse engineering process that costs even more time and money. But not if a team of Georgia Tech engineers and cybersecurity researchers are successful. They’re among the teams working to speed up the process with a <a href="https://www.darpa.mil/news-events/2020-07-30">$10 million Defense Advanced Research Projects Agency (DARPA)-funded effort</a> to unpack these legacy systems, incorporate updates, and redeploy them in weeks or months rather than years.</p><p>“The U.S. government has this tremendous problem where they put tons of research and development into cutting edge software, and then two years down the line, it needs to be updated or applied to a new platform or it needs patches. We can’t just go back to the drawing board and rewrite all of our software every few years,” said <a href="https://ece.gatech.edu/directory/brendan-d-saltaformaggio">Brendan Saltaformaggio</a>, an associate professor in the <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a> (SCP) and the <a href="https://ece.gatech.edu/">School of Electrical and Computer Engineering</a> (ECE).</p><p><a href="https://coe.gatech.edu/news/2023/08/distilling-outdated-software-could-save-defense-dept-millions-time-and-money"><strong>Read about the team's work on the College of Engineering website.</strong></a></p>]]></body>  <author>Joshua Stewart</author>  <status>1</status>  <created>1692196486</created>  <gmt_created>2023-08-16 14:34:46</gmt_created>  <changed>1693494888</changed>  <gmt_changed>2023-08-31 15:14:48</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Brendan Saltaformaggio leads a $10M DARPA-funded effort to update critical defense software.]]></teaser>  <type>news</type>  <sentence><![CDATA[Brendan Saltaformaggio leads a $10M DARPA-funded effort to update critical defense software.]]></sentence>  <summary><![CDATA[<p>Brendan Saltaformaggio leads a $10M DARPA-funded effort to update critical defense software.</p>]]></summary>  <dateline>2023-08-16T00:00:00-04:00</dateline>  <iso_dateline>2023-08-16T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-08-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jstewart@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:jstewart@gatech.edu">Joshua Stewart</a><br />College of Engineering</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671404</item>      </media>  <hg_media>          <item>          <nid>671404</nid>          <type>image</type>          <title><![CDATA[Brendan Saltaformaggio & Amit Sikder DARPA software]]></title>          <body><![CDATA[<p>Brendan Saltaformaggio, left, and Amit Sikder are working on a $10 million DARPA project to unpack legacy software systems, incorporate updates, and redeploy them in weeks or months rather than years. (Photo: Candler Hobbs)</p>]]></body>                      <image_name><![CDATA[_MG_2975(edited).jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/08/16/_MG_2975%28edited%29.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/08/16/_MG_2975%28edited%29.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/08/16/_MG_2975%2528edited%2529.jpg?itok=2vKaedep]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Brendan Saltaformaggio and Amit Sikder stand and look at a large screen displaying computer code. (Photo: Candler Hobbs)]]></image_alt>                    <created>1692196528</created>          <gmt_created>2023-08-16 14:35:28</gmt_created>          <changed>1692196528</changed>          <gmt_changed>2023-08-16 14:35:28</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="175307"><![CDATA[Brendan Saltaformaggio]]></keyword>          <keyword tid="690"><![CDATA[darpa]]></keyword>          <keyword tid="184856"><![CDATA[Defense Advanced Research Projects Agency]]></keyword>          <keyword tid="180043"><![CDATA[U.S. Department of Defense]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="669067">  <title><![CDATA[Phoenix Challenge: Collaborating to Improve the Information Environment]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span><span><span>Generative AI has captured worldwide attention for its potential applications in such areas as disease diagnosis, data analysis, writing, and computer coding. But at a recent meeting held at the Georgia Tech Research Institute (GTRI) in Atlanta, attendees were concerned about how very different applications of AI may be affecting critical operations in the information environment (OIE).</span></span></span></p><p><span><span><span>Nearly 250 attendees from more than 200 government, academic, and industry organizations convened at the Phoenix Challenge June 20-23 to discuss how misinformation, disinformation, and the propagation of bad information may affect the world – and how organizations across those three sectors can work together to address growing concerns about the effects of what’s happening in this arena. Although AI was among the top concerns, there were many other issues on the agenda.</span></span></span></p><p><span><span><span>The conference was organized for the Office of the Undersecretary of Defense for Policy (OUSDP) by GTRI, the University of Maryland Applied Research Laboratory for Intelligence and Security (ARLIS), and the Information Professionals Association.</span></span></span></p><p><span><span><span>The June Phoenix Challenge conference was part of a series of events designed to promote collaboration on efforts ranging from research and acquisition to operational planning and execution, with goals of reducing enterprise ambiguity in the Department of Defense, promoting awareness, and exchanging information. Recommendations coming out of the meeting’s working groups are being briefed to appropriate offices in the Department of Defense and other agencies.</span></span></span></p><p><span><span><span>“The idea for the Phoenix Challenge is to create a watering hole where everyone can participate with equal standing,” said Austin Branch, professor of the practice at ARLIS, which is funded by the OUSDP to convene the Phoenix Challenge events. “By bringing these communities together, government can enjoy additional critical thinking and testing of ideas, offering new concepts, technologies, and methodological approaches in an environment that’s collaborative and includes everyone.”</span></span></span></p><p><span><span><span>OIE – a discipline that in years past was known as information warfare – can include such topics as electronic warfare, cyber operations, military deception, and psychological operations in a broad cognitive security space. “The Phoenix Challenge is a recognized platform for collaboration and sharing, in both technical and non-technical areas, and in the hard sciences and soft sciences,” Branch said. “Participants have to be prepared to work because we’re working on solutions, and there is a sense of mutual accountability.”</span></span></span></p><p><span><span><span>Beyond the recommendations to the government, participants from industry and academic communities benefit from obtaining a better understanding of the government’s needs, plans, and concerns.</span></span></span></p><p><span><span><span>“Here, we can have everybody concentrated and focused, with a great value proposition in being able to reduce ambiguity about what the requirements are and for the government to articulate what the needs are, then allow this broader enterprise to work on those things,” Branch added.</span></span></span></p><p><span><span><span>At the Atlanta meeting, there were three panel discussions, including one on generative AI, which has both positive and negative implications for the world’s information environment.</span></span></span></p><p><span><span><span>“This technology is going to have an enormous impact on us going forward,” said Theresa Kessler, a GTRI research scientist who was among the Atlanta event’s organizers. “AI and machine learning tools can make the OIE challenges worse, or be used to make them better. There’s also a cybersecurity component and the human element of how people can be so accepting of bad information.”</span></span></span></p><p><span><span><span>The goals of the Phoenix Challenge include much more than identifying the issues. Attendees participated in six working groups organized to highlight potential solutions and make recommendations to be considered by the government. And those making the recommendations are expected to play a role in carrying them out.</span></span></span></p><p><span><span><span>“Ultimately, the goal is to affect the national defense strategy, with these output products, recommendations that the working groups built,” Kessler explained. “We had a huge representation of industry partners, along with academic participants, including multiple universities, University Affiliated Research Centers (UARCs), and Federally-Funded Research and Development Centers (FFRDCs). Each of our working groups had a representation from industry, government, and academia.”</span></span></span></p><p><span><span><span>That broad representation helped provide a perspective not limited to a single constituency, she said. “The working groups were designed and facilitated in a way that everybody’s opinion was pulled in and valued. Involving all these different groups provides a more holistic presentation of the problem and the solution set.”</span></span></span></p><p><span><span><span>In addition to a classified working group, the breakout sessions focused on:</span></span></span></p><ul><li><span><span><span>Inputs to the R&amp;D Roadmap for OIE Technologies.</span></span></span></li><li><span><span><span>Detection and Beyond: Implementing Effective Technological Solutions to Emerging OIE Threats.</span></span></span></li><li><span><span><span>Applied Research: Assessments.</span></span></span></li><li><span><span><span>Strategy for Operations in the Information Environment (SOIE) Implementation Plan Framework.</span></span></span></li><li><span><span><span>Resilience to Adversary Disinformation.</span></span></span></li></ul><p><span><span><span>Among the conference speakers were: </span></span></span></p><ul><li><span><span><span>Todd Breasseale (Deputy Assistant to the Secretary for Public Affairs, Office of Information Operations Policy).</span></span></span></li><li><span><span><span>LtGen (R) Dennis Crall, USMC.</span></span></span></li><li><span><span><span>Heidi Shyu, Under Secretary of Defense for Research and Engineering (OUSD(R&amp;E)), who addressed the conference virtually.</span></span></span></li><li><span><span><span>Neill Tipton, Director for Defense Intelligence, Collection and Special Programs.</span></span></span></li></ul><p><span><span><span>The June Phoenix Challenge event was the first hosted by GTRI, but the event has a long history, beginning decades ago and including recent meetings in London and Charleston, South Carolina. In 2022, GTRI hosted an Information Warfare Summit on its Atlanta campus, but elected to join forces with the Phoenix Challenge in 2023. The next event is likely to be held in the Washington, D.C., area during 2024.</span></span></span></p><p>&nbsp;</p><p><strong>Writer: John Toon (john.toon@gtri.gatech.edu)<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia</strong></p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $800 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1692630409</created>  <gmt_created>2023-08-21 15:06:49</gmt_created>  <changed>1692631892</changed>  <gmt_changed>2023-08-21 15:31:32</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The 2023 the Phoenix Challenge held at the Georgia Tech Research Institute was an opportunity for government, academic, and industry organizations to discuss and discover how different applications of AI may be affecting critical operations.]]></teaser>  <type>news</type>  <sentence><![CDATA[The 2023 the Phoenix Challenge held at the Georgia Tech Research Institute was an opportunity for government, academic, and industry organizations to discuss and discover how different applications of AI may be affecting critical operations.]]></sentence>  <summary><![CDATA[<p><span><span><span>Nearly 250 attendees from more than 200 government, academic, and industry organizations convened at the Phoenix Challenge June 20-23 to discuss how misinformation, disinformation, and the propagation of bad information may affect the world – and how organizations across those three sectors can work together to address growing concerns about the effects of what’s happening in this arena. </span></span></span></p>]]></summary>  <dateline>2023-08-21T00:00:00-04:00</dateline>  <iso_dateline>2023-08-21T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-08-21 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671444</item>          <item>671443</item>      </media>  <hg_media>          <item>          <nid>671444</nid>          <type>image</type>          <title><![CDATA[2023 Phoenix Challenge: USG Leader Panel at GTRI]]></title>          <body><![CDATA[<p><em>The USG Leader Panel discussed frameworks for competition in the information environment. The panel moderator was Elizabeth Chamberlain, (SES) A2A6. Panel participants were: RDML Mike Brown, OPNAV / N2N6 (SES), Russ Meade, Executive Director, Marine Corps Information Command, Col. John Agnello, Director, Army Information Advantage Program Office, Daniel Kimmage, Principal Deputy Coordinator at the Department of State Global Engagement Center, and Joe Miller, Deputy USASOC. (Credit: Christopher Moore, GTRI)</em></p>]]></body>                      <image_name><![CDATA[2023_0628_image_DO_Phoenix challenge_063-panel.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/08/21/2023_0628_image_DO_Phoenix%20challenge_063-panel.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/08/21/2023_0628_image_DO_Phoenix%20challenge_063-panel.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/08/21/2023_0628_image_DO_Phoenix%2520challenge_063-panel.jpg?itok=5BgPSN02]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[2023 Phoenix Challenge: USG Leader Panel at GTRI]]></image_alt>                    <created>1692629604</created>          <gmt_created>2023-08-21 14:53:24</gmt_created>          <changed>1692630385</changed>          <gmt_changed>2023-08-21 15:06:25</gmt_changed>      </item>          <item>          <nid>671443</nid>          <type>image</type>          <title><![CDATA[2023 Phoenix Challenge at GTRI]]></title>          <body><![CDATA[<p><em>Nearly 250 attendees from more than 200 government, academic, and industry organizations convened at the Phoenix Challenge conference at the Georgia Tech Research Institute in June 2023. (Credit: Christopher Moore, GTRI)</em></p>]]></body>                      <image_name><![CDATA[2023_0628_image_DO_Phoenix challenge_019-lobby.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/08/21/2023_0628_image_DO_Phoenix%20challenge_019-lobby.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/08/21/2023_0628_image_DO_Phoenix%20challenge_019-lobby.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/08/21/2023_0628_image_DO_Phoenix%2520challenge_019-lobby.jpg?itok=Zofmq_-9]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[2023 Phoenix Challenge at GTRI]]></image_alt>                    <created>1692629308</created>          <gmt_created>2023-08-21 14:48:28</gmt_created>          <changed>1692629417</changed>          <gmt_changed>2023-08-21 14:50:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="192965"><![CDATA[Phoenix Challenge]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="192390"><![CDATA[generative AI]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="8246"><![CDATA[Department of Defense]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="192966"><![CDATA[information environment]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="669001">  <title><![CDATA[GridTrust Helps Protect the Nation’s Electric Utilities from Cyber Threats]]></title>  <uid>35832</uid>  <body><![CDATA[<div><div><div><div><h4>A new cybersecurity technology that relies on the unique digital fingerprint of individual semiconductor chips could help protect the equipment of electrical utilities from malicious attacks that exploit software updates on devices controlling the critical infrastructure.</h4><p>The GridTrust project, which has been successfully tested in a real substation of a U.S. municipal power system, combines the digital fingerprint with cryptographic technology to provide enhanced security for the utilities and other critical industrial systems that must update control device software or firmware.</p><p>Led by researchers at the Georgia Institute of Technology (Georgia Tech) in collaboration with the City of Marietta, Georgia, the project was supported by the U.S. Department of Energy's <strong><a href="http://www.energy.gov/ceser/office-cybersecurity-energy-security-and-emergency-response">Office of Cybersecurity</a></strong>, Energy Security, and Emergency Response (CESER). GridTrust also included researchers from<strong> <a href="http://www.sandia.gov">Sandia National Laboratories</a></strong> and Protect Our Power, a security-focused not-for-profit organization. The three-year, $3 million project began in 2021.</p><div><div><div><div><h2>GridTrust Improves Security for Device Updates</h2><p>“The security of updates applied to equipment is critical to maintaining operation of the nation’s electricity grid,” said <strong><a href="https://ece.gatech.edu/directory/santiago-carlos-grijalva">Santiago Grijalva</a></strong>, the project’s principal investigator and Southern Company Distinguished Professor in Georgia Tech’s <strong><a href="https://ece.gatech.edu">School of Electrical and Computer Engineering</a></strong>. “We have demonstrated that GridTrust can block direct cyber-attacks through the equipment supply chain in multiple configurations and scenarios, while also preventing a whole array of potential errors. What we have developed and demonstrated will provide multiple layers of additional security to the existing electricity grid.”</p><p>The project focused on power system controllers, including sensors, actuators, and protection relays that are normally located in power substations distributed throughout a utility’s service area. Malicious actors may attempt to alter the software controlling the devices to, for instance, turn off power or damage the equipment. The attacks could take place if technicians attempt to use corrupted software to make updates at utility substations or other facilities.</p><div><div><div><div><h2>Authentication Uses Semiconductor PUFs, Cryptography</h2><p>Installed as part of the substation equipment, GridTrust would verify the authenticity of the software before any updates were installed, and it would ensure that the software was being applied to the correct device – by a person authorized to do so. In addition to cryptographic technologies, the system uses a new form of security based on unique physically unclonable functions (PUFs) that exist in certain semiconductor chips. PUFs are a set of unique characteristics created by minor variations that occur during chip fabrication.</p><p>“The PUF relies on random behavior based on variations in the manufacturing process, and they cannot be changed after fabrication,” said <strong><a href="https://ece.gatech.edu/directory/vincent-j-mooney">Vincent Mooney</a></strong>, an associate professor in Georgia Tech’s <strong><a href="https://ece.gatech.edu">School of Electrical and Computer Engineering</a></strong>. “During an update, the GridTrust interfacing device first proves its identity using the PUF, then it verifies both utility and vendor signatures using their public RSA keys. Only if all these checks are passed will the firmware update be successfully installed. If the update isn’t installed, the device will continue to operate with its previous firmware version, and the utility’s network operations center will be notified to investigate.”</p><p>The GridTrust technology can operate as a standalone device with existing utility equipment or be built into new devices. Utility sensors, actuators, relays and similar control devices are currently produced by multiple manufacturers, and the Georgia Tech researchers have been in contact with an existing supplier that is interested in incorporating the technology, Grijalva said.</p><div><div><div><div><h2>GridTrust Evaluated in a Real Utility Substation</h2><p>Initial testing of the GridTrust system took place in Georgia Tech laboratories, then researchers worked with technical staff at the city of Marietta to evaluate the system in one of the utility’s substations. Located northwest of Atlanta, <strong><a href="https://www.mariettaga.gov/1503/Power-Water">Marietta’s power</a></strong> network serves approximately 42,000 customers, including several critical electrical loads. The testing was done in a substation circuit isolated from the grid to ensure that the research activity would not affect customers.</p><p>“When Georgia Tech approached us about participating in an operational technology security research project, we were excited to participate, especially considering that our mayor and city manager have always supported working with state and local universities to develop new programs and technologies to solve real-world challenges,” said Ronald Barrett, Director of Information Technology for Marietta.</p><div><div><div><div><h2>GTRI Cybersecurity “Red Team” Challenges the System</h2><p>As part of the testing, Grijalva and Mooney involved “red team” cybersecurity researchers from the Georgia Tech Research Institute (GTRI), Georgia Tech’s applied research organization. GTRI researchers Trevor Lewis, David Huggins, Sam Litchfield, and Matt Guinn led an effort to challenge the GridTrust system with sophisticated attempts to install software that simulated the kind of potential malware that could affect utility equipment.</p><p>“They pretended to be black-hat hackers who wanted to compromise the system by pushing a malicious configuration file to one of the devices or initiating a firmware update without being authorized to do that,” said Huggins, a GTRI senior research engineer. “They had several attack methods and strategies aimed at multiple components of the system – and were not successful.”</p><p>Such third-party validation is important to a broad range of systems, noted Lewis, a senior research engineer who participates in “red team” test scenarios for many critical systems. “We are routinely contracted to perform assessments on a variety of system architectures to emulate the actions of real cyber attackers, and to test and evaluate the security of all components within an architecture under test,” he said.</p><div><div><div><div><h2>Next Step: Implementation in Utility Industry</h2><p>While there are multiple manufacturers of equipment for the utility industry, the devices provide similar functions and have similar needs for periodic updating. The protection system developed by Georgia Tech should be broadly applicable to devices produced by different manufacturers, and could therefore have broad application to the utility industry.</p><p>“Georgia Tech is creating technology that makes energy delivery systems safer, and protecting that critical infrastructure is important for national security,” Huggins said. “Reliable electrical power is critical to every aspect of our society today.”</p><p>In addition to ensuring the safety of device updates, the GridTrust system will also help utilities inventory the software operating on substation devices. Large utility companies can have hundreds or thousands of substations in their service areas, each with dozens of devices that may need periodic updates.</p><p>The three-year GridTrust project is now moving into the commercialization phase where it could be licensed to manufacturers or spun off into a start-up company, Grijalva said. For utilities like Marietta Power that want to be on the cutting edge of cybersecurity, that comes as welcome news.</p><p>“We believe the work that Georgia Tech has done is critical to maintaining a safe and secure electrical grid,” said Eric Patten, Marietta Power’s electrical director. “Our goal for this project was to see a system that added another layer of security from attacks, and from what we have seen, we believe this was a success.”</p></div></div></div></div><div><div><div><div><p><br />Writer: <a href="mailto:john.toon@gtri.gatech.edu">John Toon</a>&nbsp;(john.toon@gtri.gatech.edu)<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>&nbsp;</p><p>The <a href="https://gtri.gatech.edu">Georgia Tech Research Institute (GTRI)</a> is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees supporting eight laboratories in over 20 locations around the country and performing more than $800 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1692209987</created>  <gmt_created>2023-08-16 18:19:47</gmt_created>  <changed>1692210268</changed>  <gmt_changed>2023-08-16 18:24:28</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[GridTrust is a cybersecurity project that relies on the unique digital fingerprint of individual semiconductor chips and cryptographic technology to help protect the equipment of electrical utilities. ]]></teaser>  <type>news</type>  <sentence><![CDATA[GridTrust is a cybersecurity project that relies on the unique digital fingerprint of individual semiconductor chips and cryptographic technology to help protect the equipment of electrical utilities. ]]></sentence>  <summary><![CDATA[<p><span><span>A new cybersecurity technology that relies on the unique digital fingerprint of individual semiconductor chips could help protect the equipment of electrical utilities from malicious attacks that use software updates on devices controlling the critical infrastructure.</span></span></p>]]></summary>  <dateline>2023-08-16T00:00:00-04:00</dateline>  <iso_dateline>2023-08-16T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-08-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671410</item>          <item>671408</item>          <item>671409</item>      </media>  <hg_media>          <item>          <nid>671410</nid>          <type>image</type>          <title><![CDATA[GridTrust system]]></title>          <body><![CDATA[<p>Left: A Marietta electrical substation was used for testing the GridTrust system. Right: The Georgia Tech research team is shown in the Marietta substation yard with collaborators from the city of Marietta. (Credit: City of Marietta)</p>]]></body>                      <image_name><![CDATA[grid-trust-feature_005_10.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/08/16/grid-trust-feature_005_10.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/08/16/grid-trust-feature_005_10.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/08/16/grid-trust-feature_005_10.jpg?itok=Amuq1HjI]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GridTrust system]]></image_alt>                    <created>1692209653</created>          <gmt_created>2023-08-16 18:14:13</gmt_created>          <changed>1692209822</changed>          <gmt_changed>2023-08-16 18:17:02</gmt_changed>      </item>          <item>          <nid>671408</nid>          <type>image</type>          <title><![CDATA[Semiconductor chip to help create the cybersecurity for the GridTrust system]]></title>          <body><![CDATA[<p>Left: The physically unclonable functions (PUF) of a semiconductor chip help create the cybersecurity for the GridTrust system. Right: A “red team” from the Georgia Tech Research Institute (GTRI) tested the GridTrust system’s ability to protect substation devices from cyberattack. (Credit: City of Marietta)</p>]]></body>                      <image_name><![CDATA[grid-trust-feature_002.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/08/16/grid-trust-feature_002.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/08/16/grid-trust-feature_002.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/08/16/grid-trust-feature_002.jpg?itok=-nXN0Rbb]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Semiconductor chip to help create the cybersecurity for the GridTrust system]]></image_alt>                    <created>1692209023</created>          <gmt_created>2023-08-16 18:03:43</gmt_created>          <changed>1692209291</changed>          <gmt_changed>2023-08-16 18:08:11</gmt_changed>      </item>          <item>          <nid>671409</nid>          <type>video</type>          <title><![CDATA[GridTrust Helps Protect the Nation’s Electric Utilities from Cyber Threats]]></title>          <body><![CDATA[<p><span><span>A new cybersecurity technology that relies on the unique digital fingerprint of individual semiconductor chips could help protect the equipment of electrical utilities from malicious attacks that use software updates on devices controlling the critical infrastructure.</span></span></p>]]></body>                      <youtube_id><![CDATA[bDe2Do0BF_Y]]></youtube_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <vimeo_id><![CDATA[]]></vimeo_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <video_url><![CDATA[https://www.youtube.com/watch?v=bDe2Do0BF_Y&amp;t=1s]]></video_url>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>                    <created>1692209522</created>          <gmt_created>2023-08-16 18:12:02</gmt_created>          <changed>1692209629</changed>          <gmt_changed>2023-08-16 18:13:49</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="807"><![CDATA[environment]]></keyword>          <keyword tid="213"><![CDATA[energy]]></keyword>          <keyword tid="192958"><![CDATA[GridTrust]]></keyword>          <keyword tid="170419"><![CDATA[Marietta]]></keyword>          <keyword tid="177901"><![CDATA[cobb county]]></keyword>          <keyword tid="1564"><![CDATA[community]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="166855"><![CDATA[School of Electrical and Computer Engineering]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668572">  <title><![CDATA[Tech Student Brings Artificial Intelligence to Basketball Officiating]]></title>  <uid>36418</uid>  <body><![CDATA[<p><span><span><span><span><span><span><span><span><span><span>Every sports fan can recall a moment that had them screaming from their seat or their couch as their favorite team landed on the wrong end of an official’s crucial call. Now, artificial intelligence could offer assistance.</span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>Ayush Pai, an avid NBA viewer, set out to create a solution as he watched fouls go uncalled and outcomes be decided by officials rather than the players.</span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>With a self-taught knowledge of computer vision AI, he created the initial model for the official­­ –– dubbed version 1.0 –– in the summer of 2022 after graduating high school. With soccer's video assistant referee (VAR) system and the Hawk-Eye review system in tennis as a guide, Pai felt that basketball was missing an AI component to supplement referees on the court. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>"The officials are running up and down the court constantly. Basketball in general, especially the NBA, is one of the most fast-paced sports, and the entire court is difficult for officials to see at all times. Why not implement a system that can enhance their ability to see the floor using multiple cameras with real-time processing and detection of the basketball and the players?" he said. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>Version 1.0 of Pai's system was trained to detect the color of the basketball and used a pedometer to track steps, but lighting issues and the use of a cumbersome step counter proved limiting. In June, the Denver Nuggets capped a 4-1 series victory over the Miami Heat to earn their first NBA championship, but officiating mistakes in the Heat's lone win propelled Pai to get back to work on his concept. By the end of the month, version 2.0 of the AI official was complete. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>To improve accuracy, he used over 3,000 photos of basketballs to better train the model to track the ball's movement, and he also used pose estimation for tracking the position of a player's ankles and wrists to detect double dribbling and traveling violations. He is now working on version 3.0, which will include the capacity for multiple players, cameras, and the ability to detect shooting fouls and reach-ins. Pai is also developing a mobile app that he hopes will bring accurate officiating to youth leagues and pickup games worldwide. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>The AI craze shows no signs of slowing down, and Pai sees his creation as a way to introduce the concept to new audiences. "Everyone should see the potential of AI, and it's important that everyone has a basic understanding of its implications and how it can be used in different fields. You can use AI for ChatGPT, in Tesla's autonomous systems, and even in sports," he said. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>An ongoing debate amid the rise of AI is its potential to displace people. Pai sees the benefit of his system as one of coexistence rather than a replacement for the human element of officiating. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>"You don't want to make AI feel like a threat to the people in any industry. It's a much better approach to consider this a partnership between AI and officials. In basketball, there are so many physical aspects of the job that AI can't do," he said. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>The Florida native will trade his University of Florida Gator blue and orange for Yellow Jacket white and gold this fall as a transfer student, and the incoming second-year student is eager to get started.&nbsp;&nbsp; </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>"One of the main reasons I transferred is because of the opportunities the Institute offers within AI and computer science,” he said. “The chance to participate in the<a href="https://www.cc.gatech.edu/threads-better-way-learn-computing"> College of Computing's Threads program</a> will help me with my projects, and I’m looking forward to exploring the entrepreneurial side of Tech with great programs that foster innovation."&nbsp; </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>Pai’s interest in the capabilities of AI isn’t limited to basketball. He has also created systems that attempt to <a href="https://www.youtube.com/watch?v=_n11FjgelF8">discourage texting and driving</a> and <a href="https://www.youtube.com/watch?v=YPSazrEqlxo">keep students on task while studying</a>. </span></span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span><span>Georgia Tech continues to cement itself as a leader in the emerging space, highlighted by the <a href="https://www.gatech.edu/news/2023/06/06/ai-hub-georgia-tech-unite-campus-artificial-intelligence-rd-and-commercialization">recent launch of the AI Hub on campus</a>, which will drive education and research while developing real-world, responsible applications for AI.</span></span></span></span></span></span></span></span></span></span></p>]]></body>  <author>sgagliano3</author>  <status>1</status>  <created>1690292021</created>  <gmt_created>2023-07-25 13:33:41</gmt_created>  <changed>1690314477</changed>  <gmt_changed>2023-07-25 19:47:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Block or charge? An AI-powered basketball official could help make the call.]]></teaser>  <type>news</type>  <sentence><![CDATA[Block or charge? An AI-powered basketball official could help make the call.]]></sentence>  <summary><![CDATA[<p><span><span><span><span><span><span><span>Block or charge? An AI-powered basketball official could help make the call.</span></span></span></span></span></span></span></p>]]></summary>  <dateline>2023-07-25T00:00:00-04:00</dateline>  <iso_dateline>2023-07-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-07-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Block or charge? An AI-powered basketball official could help make the call.]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[Steven.gagliano@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Steven Gagliano - Communications Officer&nbsp;</p><p>Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671213</item>          <item>671212</item>          <item>671217</item>      </media>  <hg_media>          <item>          <nid>671213</nid>          <type>video</type>          <title><![CDATA[Ayush Pai - Building an Advanced AI Basketball Referee]]></title>          <body><![CDATA[<p><span><span><span><span><span><span><span>A Tech student is bringing artificial intelligence to basketball officiating. </span></span></span></span></span></span></span></p>]]></body>                      <youtube_id><![CDATA[VZgXUBi_wkM]]></youtube_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <vimeo_id><![CDATA[]]></vimeo_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <video_url><![CDATA[https://www.youtube.com/watch?v=VZgXUBi_wkM]]></video_url>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>                    <created>1690303580</created>          <gmt_created>2023-07-25 16:46:20</gmt_created>          <changed>1690303580</changed>          <gmt_changed>2023-07-25 16:46:20</gmt_changed>      </item>          <item>          <nid>671212</nid>          <type>image</type>          <title><![CDATA[Ayush Pai's AI basketball official identdying a violation. ]]></title>          <body><![CDATA[<p>Ayush Pai's AI basketball official detects a violation. </p>]]></body>                      <image_name><![CDATA[Screenshot 2023-07-25 at 8.49.20 AM.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/07/25/Screenshot%202023-07-25%20at%208.49.20%20AM.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/07/25/Screenshot%202023-07-25%20at%208.49.20%20AM.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/07/25/Screenshot%25202023-07-25%2520at%25208.49.20%2520AM.png?itok=ZYUYUHLm]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Ayush Pai's AI basketball official identdying a violation. ]]></image_alt>                    <created>1690303361</created>          <gmt_created>2023-07-25 16:42:41</gmt_created>          <changed>1690385669</changed>          <gmt_changed>2023-07-26 15:34:29</gmt_changed>      </item>          <item>          <nid>671217</nid>          <type>image</type>          <title><![CDATA[Ayush Pai's AI basketball official detects a traveling violation. ]]></title>          <body><![CDATA[<p>Ayush Pai's AI basketball official detects a traveling violation. </p>]]></body>                      <image_name><![CDATA[Screenshot 2023-07-19 at 12.50.30 PM.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/07/25/Screenshot%202023-07-19%20at%2012.50.30%20PM.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/07/25/Screenshot%202023-07-19%20at%2012.50.30%20PM.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/07/25/Screenshot%25202023-07-19%2520at%252012.50.30%2520PM.png?itok=FLeqcin3]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Ayush Pai's AI basketball official detects a traveling violation. ]]></image_alt>                    <created>1690314344</created>          <gmt_created>2023-07-25 19:45:44</gmt_created>          <changed>1690314344</changed>          <gmt_changed>2023-07-25 19:45:44</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>      </news_terms>  <keywords>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="2142"><![CDATA[basketball]]></keyword>          <keyword tid="12526"><![CDATA[NBA]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668560">  <title><![CDATA[GTRI’s Professional Education Program Provides Real-World Training to Current, Future Leaders]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span><span><span>Chikita Sanders, a research associate at the Georgia Tech Research Institute (GTRI), was recently looking for her next professional challenge – something that would sharpen her technical skills and widen her industry knowledge, but wouldn’t require her to pursue another advanced degree. </span></span></span></p><p><span><span><span>Sanders found the perfect fit in GTRI’s Professional Education program (GTRI-PE). GTRI-PE is connected to the Georgia Tech Professional Education program (GTPE) and offers short courses and certificate programs taught by GTRI researchers in the areas of defense technology, cybersecurity, and occupational safety and health. </span></span></span></p><p><span><span><span>Sanders last year earned a cybersecurity certificate through the program, which teaches participants how to best mitigate risk, defend their organization from external and internal threats, and more. Working in a cyber-focused role at GTRI, Sanders said the program equipped her with the strategic and technical knowledge to help protect GTRI against emerging threats. </span></span></span></p><p><span><span><span>“The program was exactly what I was looking for,” said Sanders. “It fit into my schedule and helped me <span><span>obtain more career-specific credentials</span></span>.” </span></span></span></p><p><span><span><span>GTRI-PE offers over 100 distinct courses taught by more than 160 instructors. During FY22, the program delivered a total of 184 courses, predominantly catering to organizations such as the U.S. Department of Defense (DoD) and various government sponsors. GTRI researchers with a suitable background and proficiency may serve as instructors. Instructors receive supplemental compensation as an acknowledgment of their contributions to the program. </span></span></span></p><p><span><span><span>GTRI-PE Director Renita Folds said GTRI researchers provide a practical perspective to the classroom that extends beyond theories and concepts.&nbsp;&nbsp; </span></span></span></p><p><span><span><span>“GTRI researchers bring immense value to our short courses, primarily through their extensive experience in their respective fields,” Folds said. “They are actively engaged in applied research and working on cutting-edge solutions for complex problems on a daily basis. This direct involvement in the field allows them to bring real-world insights and up-to-date knowledge to the classroom, enhancing the learning experience for our course participants.” </span></span></span></p><p><span><span><span>GTRI places high importance on providing courses that cater to the current demand in various fields. While radio frequency (RF) electromagnetic warfare (EW) and cybersecurity remain highly sought-after disciplines, the Georgia Institute of Technology (Georgia Tech) also recognizes the significance of emerging technologies. Hence, GTRI is prioritizing the development of courses focused on cutting-edge subjects like artificial intelligence (AI), machine learning (ML), and data science. A new communications certificate program is currently under development and is set to launch in FY24, said Folds.</span></span></span></p><p><span><span><span><span>“We recognize how critical it is for our government and industry partners to stay ahead of these pressing issues,” she said. &nbsp;&nbsp;</span></span></span></span></p><p><span><span><span><span>GTRI-PE offers a mix of in-person, hybrid and virtual classes, which consist of lectures, discussion sessions, and hands-on projects. &nbsp;</span></span></span></span></p><p><span><span><span><span>While instructors are considered to be experts on the topics that they teach about, GTRI Principal Research Engineer </span>Carlos Dávila, who teaches courses on radar systems and electronic warfare (EW), said he is often just as much a student as a teacher. </span></span></span></p><p><span><span><span>Dávila has been an instructor for the past 20 years, and developed two short courses for the program – <span>Modeling and Simulation of Radar Systems and Basic Electronic Warfare Modeling, which are centered on two widely-used programming languages, </span>MATLAB and Simulink. &nbsp;</span></span></span></p><p><span><span><span><span>“The intent with these courses is to build upon theoretical concepts by having students develop models that reinforce and illustrate those fundamentals,” </span>Dávila said. </span></span></span></p><p><span><span><span>Dávila said his favorite part of being an instructor is gaining fresh perspectives from students, who help him stay current on the ever-changing dynamics of his field. </span></span></span></p><p><span><span><span><span>“I see teaching and performing research as very complementary,” he said. “My students keep me hungry to improve both the breadth and depth of my knowledge base.” </span></span></span></span></p><p><span><span><span><span>Another instructor, GTRI Principal Research Scientist Matt Guinn, has also been with the program for 20 years and developed the cybersecurity course Introduction to Penetration Testing. Guinn’s class is lab-based and provides students with an understanding of the fundamental threat vectors and exploitation techniques adversaries use to breach systems and networks. </span></span></span></span></p><p><span><span><span><span>Guinn also co-teaches a course related to his own class called Defensive Cyber Operations. This course is also lab-based and introduces students to modern defensive skills required to counteract cyber threats. </span></span></span></span></p><p><span><span><span><span>“I often teach these courses back-to-back, which is fun because students get to spend the first class thinking about threats from an adversary’s perspective, and then flip things around and learn about how to best defend against those threats in the second class.” &nbsp;</span></span></span></span></p><p><span><span><span><span>Guinn most enjoys demystifying cyber threats and providing his students with practical tools to be prepared to defend their organizations against them. &nbsp;</span></span></span></span></p><p><span><span><span><span>“One of the main things that I try to accomplish with my class is to teach professionals who may have a limited amount of technical experience with handling cyber breaches the fundamentals of how to best address them,” he said. </span></span></span></span></p><p><span><span><span><span>But GTRI-PE is not limited to novices. &nbsp;</span></span></span></span></p><p><span><span><span><span>Industry veterans who participate in the program say they can’t believe how much there is left to learn. </span></span></span></span></p><p><span><span><span><span>Jaime Downing, an information security manager at the Naval Air Systems Command (NAVAIR), Naval Air Warfare Center Aircraft Division (NAWCAD), which provides integrated air warfare capabilities to the U.S. Navy, has close to 25 years of cybersecurity experience, an MS in Information Systems Management Cybersecurity and multiple cyber certifications. Downing has audited cyber courses offered by similar programs across the country. </span></span></span></span></p><p><span><span><span><span>Downing, who earned GTRI’s cybersecurity certificate in 2021, said the practicality of the classes and the ability to collaborate with other DoD professionals helped her view cyber concepts in a new light.&nbsp;&nbsp; </span></span></span></span></p><p><span><span><span><span>“GTRI </span>provided perspectives to help with delivering objectives and benchmarks associated with vulnerabilities, threats and risk reduction,” Downing said. “E<span>ven at the expert level, there is something new to learn every day. The </span>GTRI team provided professionalism and friendliness, displayed significant details, and was well versed on the topics taught.” </span></span></span></p><p><span><span><span><span>Downing added that the program reinforced the importance of maintaining strong cyber networks from a national security standpoint.&nbsp;&nbsp; </span></span></span></span></p><p><span><span><span><span>“From a DoD perspective, the U.S. has to be trained one step further than its adversaries,” she said. “We need to make sure that we are as cyber-savvy as possible and that all of our networks are secured. Our nation’s future depends on it.”&nbsp; </span></span></span></span></p><p><span><span><span><span>If you are interested in learning more about GTRI-PE, you may contact Renita Folds at </span><a href="mailto:renita.folds@gtri.gatech.edu">renita.folds@gtri.gatech.edu</a><span>. </span></span></span></span></p><p>&nbsp;</p><p>Writer: Anna Akins&nbsp;<br />Photos: Sean McNeil&nbsp;<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia</p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $800 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1690209681</created>  <gmt_created>2023-07-24 14:41:21</gmt_created>  <changed>1690209922</changed>  <gmt_changed>2023-07-24 14:45:22</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[GTRI-PE is connected to the Georgia Tech Professional Education program (GTPE) and offers short courses and certificate programs taught by GTRI researchers in the areas of defense technology, cybersecurity, and occupational safety and health. ]]></teaser>  <type>news</type>  <sentence><![CDATA[GTRI-PE is connected to the Georgia Tech Professional Education program (GTPE) and offers short courses and certificate programs taught by GTRI researchers in the areas of defense technology, cybersecurity, and occupational safety and health. ]]></sentence>  <summary><![CDATA[<p><span><span><span>GTRI-PE offers over 100 distinct courses taught by more than 160 instructors. GTRI places high importance on providing courses that cater to the current demand in various fields. While radio frequency (RF) electromagnetic warfare (EW) and cybersecurity remain highly sought-after disciplines, the Georgia Institute of Technology (Georgia Tech) also recognizes the significance of emerging technologies. Hence, GTRI is prioritizing the development of courses focused on cutting-edge subjects like artificial intelligence (AI), machine learning (ML), and data science.</span></span></span></p>]]></summary>  <dateline>2023-07-24T00:00:00-04:00</dateline>  <iso_dateline>2023-07-24T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-07-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671196</item>      </media>  <hg_media>          <item>          <nid>671196</nid>          <type>image</type>          <title><![CDATA[GTRI Principal Research Engineer Phil West]]></title>          <body><![CDATA[<p><em>GTRI Principal Research Engineer Phil West (pictured) teaches a professional education course on cyber warfare and electromagnetic warfare (Photo Credit: Sean McNeil). </em></p>]]></body>                      <image_name><![CDATA[2023_0508_image_DO_cybersecurity professional education_011.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/07/24/2023_0508_image_DO_cybersecurity%20professional%20education_011.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/07/24/2023_0508_image_DO_cybersecurity%20professional%20education_011.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/07/24/2023_0508_image_DO_cybersecurity%2520professional%2520education_011.JPG?itok=BZ03LYzy]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI Principal Research Engineer Phil West]]></image_alt>                    <created>1690209450</created>          <gmt_created>2023-07-24 14:37:30</gmt_created>          <changed>1690209553</changed>          <gmt_changed>2023-07-24 14:39:13</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="2662"><![CDATA[professional education]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="192883"><![CDATA[defense technology]]></keyword>          <keyword tid="178829"><![CDATA[Occupational Safety &amp; Health]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667967">  <title><![CDATA[Breakthrough Scaling Approach Cuts Cost, Improves Accuracy of Training DNN Models]]></title>  <uid>32045</uid>  <body><![CDATA[<p>A new machine-learning (ML) framework for clients with varied computing resources is the first of its kind to successfully scale deep neural network (DNN) models like those used to detect and recognize objects in still and video images.</p><p>The ability to uniformly scale the width (number of neurons) and depth (number of neural layers) of a DNN model means that remote clients can equitably participate in distributed, real-time training regardless of their computing resources. Resulting benefits include improved accuracy, increased efficiency, and reduced computational costs.</p><p>Developed by Georgia Tech researchers, the ScaleFL framework advances federated learning, which is an ML approach inspired by the personal data scandals of the past decade.</p><p>Federated learning (FL), a term coined by Google in 2016, enables a DNN model to be trained across decentralized devices or servers. Because data aren’t centralized with this approach, threats to data privacy and security are minimized.</p><p>The FL process begins with sending the initial parameters of a global DNN model to smartphones, IoT devices, edge servers, or other participating devices. These edge clients train their local version of the model using their unique data. All local results are aggregated and used to update the global model.</p><p>The process is repeated until the new model is fully trained and meets its design specifications.</p><p>Federated learning works best when remote clients involved in training a new DNN model have comparable computational power and bandwidth. But training can bog down if some participating remote-client devices have limited or fluctuating computing resources.</p><p>“In most real-life applications computational resources tend to differ significantly across clients. This heterogeneity prevents clients with insufficient resources from participating in certain FL tasks that require large models,” said School of Computer Science (CS) Ph.D. student Fatih Ilhan.</p><p>“Federated learning should promote equitable AI practice by supporting a resource-adaptive learning framework that can scale to heterogeneous clients with limited capacity,” said Ilhan, who is advised by Professor Ling Liu.</p><p>Ilhan is the lead author of&nbsp;<a href="https://openaccess.thecvf.com/content/CVPR2023/papers/Ilhan_ScaleFL_Resource-Adaptive_Federated_Learning_With_Heterogeneous_Clients_CVPR_2023_paper.pdf"><em>ScaleFL: Resource-Adaptive Federated Learning with Heterogeneous Clients</em></a>, which he is presenting at the <a href="https://cvpr2023.thecvf.com/">2023 Conference on Computer Vision and Pattern Recognition</a>. CVPR 23 is set for June 18-22 in Vancouver, Canada.</p><p>Creating a framework that can adaptively scale the global DNN model based on a remote client’s computing resources is no easy feat. Ilhan says the balance between a model’s basic and complex feature extraction capabilities can be easily thrown out of whack when manipulating the number of neurons or the number of neuron layers of a DNN model.</p><p>“Since a deeper model is more capable of extracting higher order, complex features while a wider model has access to a finer resolution of lower-order, basic features, performing model size reduction across one dimension causes unbalance in terms of the learning capabilities of the resulting model,” said Ilhan.</p><p>The team overcomes these challenges in part by incorporating early exit classifiers into ScaleFL.</p><p>These ML-based tools are designed to optimize accuracy and efficiency by introducing intermediate decision points in the classification process. This capability enables a model to complete an inference task as soon as it is confident in its prediction, without having to process the whole model.</p><p>“ScaleFL injects these classifiers to the global model at certain layers based on the model architecture and computational constraints at each complexity level. This enables forming low-cost local models by keeping the layers up to the corresponding exit,” said Ilhan.</p><p>“Two-dimensional scaling with splitting the model along depth and width dimensions yields uniformly scaled, efficient local models for resource-constrained clients. As a result, not only does the global model achieves better performance compared to baseline FL approaches and existing algorithms, but local models at different complexity levels also perform significantly better for clients that are resource-constrained at inference time.”</p><p>The exit classifiers that help balance a model’s basic and complex features also play into the second part of ScaleFL’s secret sauce, self-distillation.</p><p>Self-distillation is a form of knowledge distillation, which has been used to transfer knowledge from a ‘teacher’ model to a smaller ‘student’ model. ScaleFL applies this process within the same network by comparing early predictions made by the exit classifiers (students) and the final predictions of the last exit (teacher) of local models during optimization. This technique prevents isolation and improves the knowledge transfer among subnetworks of different levels in ScaleFL.</p><p>Ilhan and his collaborators extensively tested ScaleFL on three image classification datasets and two natural language processing datasets.</p><p>“Our experiments show that ScaleFL outperforms existing representative heterogeneous federated learning approaches. In local model evaluations, we were able to reduce latency by two times, and the model size by four times, all while keeping the performance loss below 2%,” said Ilhan.</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1685671538</created>  <gmt_created>2023-06-02 02:05:38</gmt_created>  <changed>1689185480</changed>  <gmt_changed>2023-07-12 18:11:20</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new machine learning framework promotes equitable AI practice while advancing a popular distributed model training approach.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new machine learning framework promotes equitable AI practice while advancing a popular distributed model training approach.]]></sentence>  <summary><![CDATA[<p>School of Computer Science researchers have developed a new framework that advances federated learning, a distributed, real-time approach for training deep neural network models. The new framework enables remote clients to equitably participate in training regardless of their computing resources.</p>]]></summary>  <dateline>2023-06-02T00:00:00-04:00</dateline>  <iso_dateline>2023-06-02T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-06-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[albert.snedeker@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Ben Snedeker, Communications Manager II<br />Georgia Tech<br />College of Computing</p><p>albert.snedeker@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670912</item>      </media>  <hg_media>          <item>          <nid>670912</nid>          <type>image</type>          <title><![CDATA[Georgia Tech CS Ph.D. student Ilhan Fatih]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Screen Shot 2023-06-01 at 2.48.19 PM.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/06/01/Screen%20Shot%202023-06-01%20at%202.48.19%20PM.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/06/01/Screen%20Shot%202023-06-01%20at%202.48.19%20PM.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/06/01/Screen%2520Shot%25202023-06-01%2520at%25202.48.19%2520PM.png?itok=DMqLcHNf]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[An outdoor photo portrait of Georgia Tech CS Ph.D. student Ilhan Fatih]]></image_alt>                    <created>1685672138</created>          <gmt_created>2023-06-02 02:15:38</gmt_created>          <changed>1685672138</changed>          <gmt_changed>2023-06-02 02:15:38</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="576481"><![CDATA[ML@GT]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668386">  <title><![CDATA[Robustness: Making Progress by Poking Holes in Artificial Intelligence Models]]></title>  <uid>32045</uid>  <body><![CDATA[<p>Findings from two published studies could lead to enhancements in artificial intelligence (AI) models by focusing on their flaws.</p><p>One paper found that adding visual attributes to text in multimodal models could boost performance and usefulness for humans.</p><p>Another study determined that few-shot learning (FSL) models lack robustness against adversarial treatments and need improvements. &nbsp;</p><p>Georgia Tech Assistant Professor&nbsp;<strong>Srijan Kumar</strong>&nbsp;and Ph.D. student&nbsp;<strong>Gaurav Verma</strong>&nbsp;lead the research being presented at the upcoming 61st Annual meeting of the Association for Computational Linguistics (ACL 2023).</p><p>Co-authors from Georgia Tech joining Kumar and Verma include&nbsp;<a href="https://shivaen.org/"><strong>Shivaen Ramshetty</strong></a><strong>&nbsp;</strong>and&nbsp;<a href="https://www.linkedin.com/in/sarath-nookala/"><strong>Venkata Prabhakara Sarath Nookala</strong></a>, as well as&nbsp;<a href="https://www.microsoft.com/en-us/research/people/submukhe/"><strong>Subhabrata Mukherjee</strong>,</a>&nbsp;a principal researcher at Microsoft Research.</p><p>ACL 2023 brings together experts from around the world to discuss topics in natural language processing (NLP) and AI research. Kumar’s group offers to those discussions their work that focuses on robustness in AI models.&nbsp;</p><p>“Security of AI models is paramount. Development of reliable and responsible AI models are important discussion topics at the national and international levels,” Kumar said. “As Large Language Models become part of the backbone of many products and tools with which users will interact, it is important to understand when, how, and why these AI models will fail.”</p><p>[<a href="https://sites.gatech.edu/research/acl-2023/">MICROSITE: Georgia Tech at ACL 2023</a>]</p><p>Robustness refers to the degree to which an AI model’s performance changes when using new data versus training data. To ensure that a model performs reliably, it is critical to understand its robustness.&nbsp;</p><p>Trust is of essential value within robustness, both for researchers that work in AI and consumers that use it.</p><p>People lose trust in AI technology when models perform unpredictably. This issue is relevant in the ongoing societal discussion about AI security. Investigating robustness can prevent, or at least highlight, performance issues arising from unmodeled behavior and malicious attacks.</p><p><strong>Deep Learning for Every Kind of Media</strong></p><p>One aspect of AI robustness Kumar’s group will present at ACL 2023 delves into multimodal deep learning. Using this method, AI models receive and apply data through modes ranging from text, images, video, and audio.</p><p>The group’s&nbsp;<a href="https://faculty.cc.gatech.edu/~srijan/pubs/multimodal-robustness-xmai-acl2023.pdf">paper</a>&nbsp;presents a way to evaluate multimodal learning robustness called Cross-Modal Attribute Insertions (XMAI).&nbsp;</p><p>XMAI found that multimodal models perform poorly in text-to-image retrieval tasks. For example, adding more descriptive wording in search text for an image, like from “girl on a chair” to “little girl on a wooden chair,” caused the correct image to be retrieved at a lower rank.</p><p>Kumar’s group determined this when XMAI outperformed five other benchmarks in two different task retrieval tests.</p><p>“By conducting experiments in a sandbox setting to identify the plausible realistic inputs that make multimodal models fail, we can estimate various dimensions of a model’s robustness,” said Kumar. “Once these shortcomings are identified, these models can be updated and made more robust.”&nbsp;</p><p><strong>Labels Matter When It Comes to Adversarial Robustness</strong></p><p>Prompt-based few-shot learning (FSL) is another class of AI models that, like multimodal learning, uses text as input.</p><p>While FSL is a useful framework for AI to improve task performance when labeled data is limited, Kumar’s group points out in&nbsp;<a href="https://faculty.cc.gatech.edu/~srijan/pubs/few-shot-adversarial-robustness-acl2023.pdf">their ACL findings paper</a>&nbsp;that there is limited understanding of the methods’ adversarial robustness.&nbsp;&nbsp;</p><p>“Our findings shine a light on a significant vulnerability in FSL models – a marked lack of adversarial robustness,” Verma explained. “This indicates a non-trivial balancing act between accuracy and adversarial robustness of prompt-based few-shot learning for NLP.”</p><p>Kumar’s team ran tests on six GLUE benchmark tasks, comparing FSL models with fully fine-tuned models. Here, they found a notable, greater drop in task performance of FSL models treated with adversarial perturbations than that of fully fine-tuned models.&nbsp;</p><p>In the same study, Kumar’s group found and proposed a few ways to improve FSL robustness.</p><p>These include using unlabeled data for prompt-based FSLs and expanding to an ensemble of models trained with different prompts. The group also demonstrated that increasing the number of few-shot examples and model size led to increased adversarial robustness of FSL methods.</p><p>“Improved adversarial robustness of few-shot learning models is essential for their broader application and adoption,” Verma said. “By securing a balance between robustness and accuracy, all from a handful of labeled instances, we can potentially implement these models in safety-critical domains.”</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1688735372</created>  <gmt_created>2023-07-07 13:09:32</gmt_created>  <changed>1689185428</changed>  <gmt_changed>2023-07-12 18:10:28</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are working to make AI applications more reliable and more resilient.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are working to make AI applications more reliable and more resilient.]]></sentence>  <summary><![CDATA[<p>School of Computational Science and Engineering researchers are presenting two papers the upcoming 61st Annual meeting of the Association for Computational Linguistics that explore the robustness of AI applications. The work looks to improve the reliability of these systems as a step toward creating broader public trust.</p>]]></summary>  <dateline>2023-07-07T00:00:00-04:00</dateline>  <iso_dateline>2023-07-07T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-07-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[Bryant.wine@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Comms. Officer I<br />School of Computational Science &amp; Engineering<br />Bryant.wine@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671126</item>      </media>  <hg_media>          <item>          <nid>671126</nid>          <type>image</type>          <title><![CDATA[Kumar_Verma.jpeg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Kumar_Verma.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/07/07/Kumar_Verma.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/07/07/Kumar_Verma.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/07/07/Kumar_Verma.jpeg?itok=i_p1iSYW]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[a composite image of Georgia Tech Assistant Professor Srijan Kumar and Ph.D. student Gaurav Verma]]></image_alt>                    <created>1688735393</created>          <gmt_created>2023-07-07 13:09:53</gmt_created>          <changed>1688735393</changed>          <gmt_changed>2023-07-07 13:09:53</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="37041"><![CDATA[Computational Science and Engineering]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668385">  <title><![CDATA[Dataset of Committee's Public Comms Yields New Insights into Federal Reserve's Influence]]></title>  <uid>32045</uid>  <body><![CDATA[<p>An investment strategy based on findings culled from a new dataset is proving that it can provide substantially better financial returns than a traditional “buy and hold” approach.&nbsp;</p><p>The dataset compiles meeting minutes, speeches, and press conference transcripts from the Federal Open Market Committee (FOMC). It is the largest tokenized and annotated dataset of its kind.</p><p>An investment strategy developed using the dataset predicted investment returns yielding 163.4% higher than the buy and hold method on the QQQ index fund from 2011 to 2022.</p><p>The dataset and strategy are part of&nbsp;<a href="https://arxiv.org/abs/2305.07972">new research findings from Georgia Tech</a>. The findings document the influence the FOMC has on markets and the economy through its public communications. The research is being presented this month at the 61st Annual Meeting of the Association for Computational Linguistics (ACL 2023).</p><p>“By understanding the impact of FOMC communications on market movements, investors can make more informed decisions, and potentially protect their portfolios from sudden downturns or capitalize on growth opportunities,” said Ph.D. student and lead researcher&nbsp;<strong>Agam Shah</strong>.</p><p>“Additionally, it can help economists at the Federal Reserve Banks more efficiently understand the impact of their communication.”</p><p>[<a href="https://sites.gatech.edu/research/acl-2023/">MICROSITE: Georgia Tech at ACL 2023</a>]&nbsp;</p><p>The dataset contains 214 meeting minutes, 1,026 speeches, and transcripts from 63 press conferences. The meeting minutes and speeches span from January 1996 to October 2022. The press conference archive dates from April 2011 to October 2022.</p><p>To explore this heap of FOMC pronouncements, Shah and his team crafted a novel machine-learning classification task. The new task categorized statements in the dataset as hawkish, dovish, or neutral, rather than just positive, negative, or neutral.</p><p>The classification task allows computer models to understand FOMC policy stances through the language used in their correspondence. This in turn guides models to predict how markets react to communications, giving investors valuable information to form their own strategies.&nbsp;</p><p>“One of the reasons our research achieved these remarkable results is because it harnesses the power of natural language processing (NLP) to systematically analyze a vast amount of data which is impractical for humans to process effectively,” Shah said. “This provides a much more nuanced understanding of the market’s response to FOMC communications.”</p><p>Shah is a Ph.D. student in the School of Computational Science and Engineering (CSE). He is advised by&nbsp;<strong>Sudheer Chava</strong>, a professor in the Scheller College of Business.&nbsp;<strong>Suvan Paturi</strong>, a Georgia Tech alumnus and software engineer at Nasdaq eVestment, co-authored the paper with Shah and Chava.</p><p>The group will present their paper at a time when the FOMC and the Federal Reserve are in news headlines now more than ever. To curb inflation, the Fed has increased interest rates ten consecutive times from March 2022 to June 2023.</p><p>One example that inspired the group occurred during this period on Aug. 26, 2022. Here, FOMC Chair Jerome Powell gave an eight-minute speech that resulted in an almost $3 trillion decline in U.S. equity market value.</p><p>This study not only affirms that markets are reactive to words spoken through public communications but now those effects can be measured and predicted. It also provides new tools to help investors make better, more informed decisions.&nbsp;</p><p>“The application of computational methods to finance and economics revolutionizes the way analysts interpret data. It enables us to handle enormous datasets and extract valuable insights that would otherwise remain hidden,” Shah said.&nbsp;</p><p>“This empowers decision-makers to craft strategies that are based on a deeper understanding of market dynamics, leading to potentially higher returns and more efficient financial systems.”</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1688734429</created>  <gmt_created>2023-07-07 12:53:49</gmt_created>  <changed>1689185368</changed>  <gmt_changed>2023-07-12 18:09:28</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[New Georgia Tech research may help investors make more informed decisions and potentially capitalize on growth opportunities.]]></teaser>  <type>news</type>  <sentence><![CDATA[New Georgia Tech research may help investors make more informed decisions and potentially capitalize on growth opportunities.]]></sentence>  <summary><![CDATA[<p>New Georgia Tech research may help investors make more informed decisions and potentially capitalize on growth opportunities. The research team has created&nbsp;a dataset compiling meeting minutes, speeches, and press conference transcripts from the Federal Open Market Committee. It is the largest tokenized and annotated dataset of its kind.</p>]]></summary>  <dateline>2023-07-07T00:00:00-04:00</dateline>  <iso_dateline>2023-07-07T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-07-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[Bryant.wine@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Comms. Officer I<br />School of Computational Science &amp; Engineering<br />Bryant.wine@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671125</item>      </media>  <hg_media>          <item>          <nid>671125</nid>          <type>image</type>          <title><![CDATA[Finance Dataset.jpeg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Finance Dataset.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/07/07/Finance%20Dataset.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/07/07/Finance%20Dataset.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/07/07/Finance%2520Dataset.jpeg?itok=LC3e5LNO]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Conceptual digital graphic depicting rising financial markets ]]></image_alt>                    <created>1688734440</created>          <gmt_created>2023-07-07 12:54:00</gmt_created>          <changed>1688734440</changed>          <gmt_changed>2023-07-07 12:54:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="192824"><![CDATA[dataset]]></keyword>          <keyword tid="108691"><![CDATA[Federal Reserve]]></keyword>          <keyword tid="192825"><![CDATA[FOMC]]></keyword>          <keyword tid="11559"><![CDATA[CSE computational science engineering]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668227">  <title><![CDATA[Georgia Tech Researchers to Lead Pioneering Space Wargaming Series]]></title>  <uid>35797</uid>  <body><![CDATA[<p>Space is, thankfully, a peaceful place. But that lack of conflict high overhead also obscures how little scholars down here know about the ways a conflict in orbit might play out, much less how to deter it.</p><p>Georgia Tech space policy expert Mariel Borowitz thinks she has a way to help clear up some of that confusion. Under a new $1.3 million grant from the U.S. Department of Defense, Borowitz plans to help lead a major series of public space wargaming exercises. They’re meant to tease out how current U.S. deterrence strategies might fall short when it comes to stopping a conflict in space and what can be done to improve them.</p><p>“When it comes to conflict in space, the stakes are enormously high and the challenges are extremely complex,” said&nbsp;<a href="https://iac.gatech.edu/people/person/mariel-borowitz">Borowitz</a>, an associate professor in the Sam Nunn School of International Affairs, a unit of the Ivan Allen College of Liberal Arts. “This project will better equip us to understand whether existing deterrence models can help hold the line in space or whether another model is necessary to prevent a potentially devastating outbreak in orbit.”</p><p>Jon Lindsay, an associate professor in the&nbsp;<a href="https://inta.gatech.edu/" rel="noopener" target="_blank">Nunn School</a>&nbsp;with a joint appointment in the School of Cybersecurity and Privacy, will work with Borowitz on the project, as will U.S. Space Force Lt. Col. Brian Stewart — a Nunn School Ph.D. graduate who now teaches at the U.S. Air Force Academy. Jacquelyn Schneider — a Hoover Fellow at The Hoover Center at Stanford University — rounds out the team.</p><p>A central theme of the project will be trying to understand how the concept of integrated deterrence applies to conflict in space. Integrated deterrence essentially boils down to a country using everything at its disposal to prevent conflict from escalating too far, from applying diplomatic and economic pressure to bringing the military into the mix.</p><p>Using such means to deter conflict in a global hotspot on the ground is tricky enough. Look no further than Ukraine for contemporary evidence of that.</p><p>But when that hotspot is space, conflict doesn’t just threaten stability in one part of the planet. It could quickly become a serious threat to civilian communications, commerce, and military operations across the globe. Despite the high stakes, trying to understand how to tamp down such conflict is something government officials and scholars are only beginning to tackle.</p><p>Much of the work in this space focuses on improving military technology to sense what adversaries are doing and improving the ability of militaries to destroy incoming attacks quickly. But this project highlights how no complex problem can be solved without considering both technological and human factors — a core competency of the Nunn School and the Ivan Allen College of Liberal Arts.</p><p>“We understand entanglement from a technological standpoint, but we need to better understand how these entanglements affect perceptions and decisions, which ultimately shape deterrence,” Borowitz said. “And we need to have more clarity on how decisions to separate military and civilian systems or choices to integrate different sectors within the space domain more closely might affect deterrence, before billions of dollars are spent on these efforts.”</p><p>Borowitz and her colleagues have already staged versions of space conflict scenarios in the classroom at Georgia Tech. They are now broadening the scope and preparing for the first exercises, which could come as soon as September.</p><p>The team plans to hold wargaming sessions across the globe over the next few years, including at Georgia Tech and the Air Force Academy and in Washington, Brussels, Taiwan, and Tokyo. The sessions will include national security figures, scholars, students, and international partners.</p><p>The project is expected to generate a significant dataset of use to scholars, as well as a book, game design materials, and other assets to help other researchers continue the work, Borowitz said</p>]]></body>  <author>Siobhan Rodriguez</author>  <status>1</status>  <created>1687805611</created>  <gmt_created>2023-06-26 18:53:31</gmt_created>  <changed>1687806905</changed>  <gmt_changed>2023-06-26 19:15:05</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Mariel Borowitz and Jon Lindsay of the Sam Nunn School of International Affairs will help lead a series of public wargaming exercises to test the limits of U.S. deterrence strategies in space.]]></teaser>  <type>news</type>  <sentence><![CDATA[Mariel Borowitz and Jon Lindsay of the Sam Nunn School of International Affairs will help lead a series of public wargaming exercises to test the limits of U.S. deterrence strategies in space.]]></sentence>  <summary><![CDATA[<p>Under a new $1.3 million grant from the U.S. Department of Defense, Mariel Borowitz plans to help lead a major series of public space wargaming exercises. They’re meant to tease out how current U.S. deterrence strategies might fall short when it comes to stopping a conflict in space and what can be done to improve them.</p>]]></summary>  <dateline>2023-06-26T00:00:00-04:00</dateline>  <iso_dateline>2023-06-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-06-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michael.pearson@iac.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:michael.pearson@iac.gatech.edu">Michael Pearson</a><br />Ivan Allen College of Liberal Arts</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>671037</item>      </media>  <hg_media>          <item>          <nid>671037</nid>          <type>image</type>          <title><![CDATA[Space Wargaming Series.jpeg]]></title>          <body><![CDATA[<p>Mariel Borowitz and Jon Lindsay of the Sam Nunn School of International Affairs will help lead a series of public wargaming exercises to test the limits of U.S. deterrence strategies in space.</p>]]></body>                      <image_name><![CDATA[Space Wargaming Series.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/06/26/Space%20Wargaming%20Series.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/06/26/Space%20Wargaming%20Series.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/06/26/Space%2520Wargaming%2520Series.jpeg?itok=G7Ha4Mg4]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Image of Space and satellite in orbit next to Mariel Borowitz and Jon Lindsay ]]></image_alt>                    <created>1687805622</created>          <gmt_created>2023-06-26 18:53:42</gmt_created>          <changed>1687805622</changed>          <gmt_changed>2023-06-26 18:53:42</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="192808"><![CDATA[wargaming]]></keyword>          <keyword tid="167146"><![CDATA[space]]></keyword>          <keyword tid="192809"><![CDATA[wargaming exercises]]></keyword>          <keyword tid="169209"><![CDATA[Ivan Allen College of Liberal Arts; Sam Nunn School of International Affairs]]></keyword>          <keyword tid="180043"><![CDATA[U.S. Department of Defense]]></keyword>          <keyword tid="191634"><![CDATA[school of cybersecurity and privacy]]></keyword>          <keyword tid="191634"><![CDATA[school of cybersecurity and privacy]]></keyword>          <keyword tid="137281"><![CDATA[Military Technology]]></keyword>          <keyword tid="543"><![CDATA[National Security]]></keyword>          <keyword tid="192810"><![CDATA[united states air force]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71911"><![CDATA[Earth and Environment]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="668049">  <title><![CDATA[The Man Behind the Maps]]></title>  <uid>36418</uid>  <body><![CDATA[<p><span><span><span><span><span><span><span><span><span>If you’re looking for the </span></span><a href="https://gtfacilities.maps.arcgis.com/apps/instant/media/index.html?appid=848503b3354c4dfda362fda4c6869adf&amp;locale=en"><span>nearest trash can on campus</span></a><span><span> or if you’re interested in </span></span><a href="https://fm-gis2.ad.gatech.edu/building-utility.html"><span>the type of heating system</span></a><span><span> used in any given building, there's a map for that. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>In a digital age, an endless amount of data is available at the tap of a screen. That accessibility allows Doug Sims to keep all 482 of Infrastructure and Sustainability's (I&amp;S) maps up to date for the Georgia Tech community.</span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>Sims arrived at Tech in 2008 as a utility analyst. With a background in civil engineering and the keen eye of a land surveyor, he began identifying ways to streamline operations using a geographic information system (GIS). At the time, Sims explained that GIS was seldom used outside of tax assessors’ offices, but he recognized its ability to connect lines on a page to valuable data. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>"If you're looking at a line for a pipe, you can click on the pipe and see that it's a 10-inch pipe, and you can see what it carries, what it's used for, and where it goes," Sims said.</span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>Over the past 25 years, Sims noted how GIS has exponentially evolved to map out entire countries. Georgia Tech is often described as a city within a city, and with the help of GIS, that presents an opportunity for the department to get a better lay of the land. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>"We have our own electrical distribution system. We have our district energy for the chilled water and the steam managed by I&amp;S. When you look at how GIS is normally used, it's normally looking at larger scales. So, once you start shrinking it to a relatively small area like the Tech campus, it changes how you look at things as they become much more detailed,” he said. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>Now the senior </span></span><span>systems support engineer </span><span><span>for Infrastructure and Sustainability, Sims' foresight to increase GIS application was a catalyst for <a href="https://facilities.gatech.edu/maps">the data sets that exist today</a>. In his role, Sims continues to search for ways to capture additional data points and recognizes that the communal nature of a campus setting can provide opportunities for instantaneous collaboration. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>"It's a big paradigm shift. It's putting power in the hands of the people where they can make the changes immediately. Whether I'm sitting on campus or 50 miles away, I can make a change. They can hit refresh and see that change immediately. It's changing how we think about and use that data every day," he said. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>A recent project, working alongside the recycling and zero waste department, invited students to identify the location of all trash cans and recycling bins on campus. Sims' creation allowed participants to use their phones to pinpoint locations that were added to the map, which has since been used for additional analysis of the Institute's sustainability efforts. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>The ability to connect with data instantaneously has helped Sims and his staff, which recently added a new team member –– a Tech alumna who worked with the department as an undergraduate –– to expedite work orders across campus. The first widespread application of GIS mapping empowers members of the Tech community to </span></span><a href="https://storymaps.arcgis.com/stories/d5597924b6e74fa3bb9f669439e052e1"><span>report landscaping requests to I&amp;S</span></a><span><span> by marking the exact location of the issue, sending photos and any other relevant information directly to an organized dashboard for review. Sims hopes to expand this service to additional services in the coming years.</span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>Keeping campus informed and operating at its most efficient is a point of personal pride for Sims, and, wielding what he calls the “GIS hammer,” he hopes to be a springboard to assist other departments using GIS. </span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>"If people want to map something or see what we have, get in touch with me, and let's see if there's a solution we can provide to you," he said. "I'm here to come up with an answer that makes their day easier, makes their job easier, and provides data for other people to share around campus."</span></span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><span>Sims laments that while he does get the rare request for printed maps, they are often already outdated while they’re still warm from the printer due to the speed at which data changes at Tech. </span></span></span></span></span></span></span></span></span></p>]]></body>  <author>sgagliano3</author>  <status>1</status>  <created>1686327662</created>  <gmt_created>2023-06-09 16:21:02</gmt_created>  <changed>1686600257</changed>  <gmt_changed>2023-06-12 20:04:17</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Hundreds of maps detail the Tech campus. Doug Sims sees endless opportunities to utilize data to keep the community informed. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Hundreds of maps detail the Tech campus. Doug Sims sees endless opportunities to utilize data to keep the community informed. ]]></sentence>  <summary><![CDATA[<p><span><span><span><span><span><span><span><span><span>Hundreds of maps detail the Tech campus. Doug Sims sees endless opportunities to utilize data to keep the community informed. </span></span></span></span></span></span></span></span></span></p>]]></summary>  <dateline>2023-06-12T00:00:00-04:00</dateline>  <iso_dateline>2023-06-12T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-06-12 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Hundreds of maps detail the Tech campus. Doug Sims sees endless opportunities to utilize data to keep the community informed. ]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[Steven.gagliano@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:Steven.gagliano@gatech.edu">Steven Gagliano</a> - Communications Officer</p><p>Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670969</item>          <item>670970</item>      </media>  <hg_media>          <item>          <nid>670969</nid>          <type>image</type>          <title><![CDATA[Senior Systems Support Engineer for Infrastructure and Sustainability Doug Sims. ]]></title>          <body><![CDATA[<p>Senior Systems Support Engineer for Infrastructure and Sustainability Doug Sims. </p>]]></body>                      <image_name><![CDATA[IMG_6858.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/06/12/IMG_6858.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/06/12/IMG_6858.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/06/12/IMG_6858.JPG?itok=RtYqpB6N]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Senior Systems Support Engineer for Infrastructure and Sustainability Doug Sims. ]]></image_alt>                    <created>1686585233</created>          <gmt_created>2023-06-12 15:53:53</gmt_created>          <changed>1686585233</changed>          <gmt_changed>2023-06-12 15:53:53</gmt_changed>      </item>          <item>          <nid>670970</nid>          <type>image</type>          <title><![CDATA[Senior Systems Support Engineer for Infrastructure and Sustainability Doug Sims flags an upcoming project using GIS mapping. ]]></title>          <body><![CDATA[<p><strong>Senior Systems Support Engineer for Infrastructure and Sustainability Doug Sims flags an upcoming project using GIS mapping. </strong></p>]]></body>                      <image_name><![CDATA[IMG_6923.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/06/12/IMG_6923.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/06/12/IMG_6923.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/06/12/IMG_6923.JPG?itok=feci5xa2]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Senior Systems Support Engineer for Infrastructure and Sustainability Doug Sims flags an upcoming project using GIS mapping. ]]></image_alt>                    <created>1686585266</created>          <gmt_created>2023-06-12 15:54:26</gmt_created>          <changed>1686597774</changed>          <gmt_changed>2023-06-12 19:22:54</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="179355"><![CDATA[Building Construction]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="179355"><![CDATA[Building Construction]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667223">  <title><![CDATA[GTRI, Georgia Tech Launch Computer Science Pilot Program for Rural Georgia High Schools ]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span><span><span>Emerging technologies like artificial intelligence, data analytics and cybersecurity have taken the world by storm, and thanks to work being done by the Georgia Institute of Technology (Georgia Tech) and the Georgia Tech Research Institute (GTRI), they are making their way into high school curriculums in rural Georgia. </span></span></span></p><p><span><span><span>Georgia Tech’s Center for Education Integrating Science, Mathematics and Computing (CEISMC) and STEM@GTRI have launched a pilot program for rural Georgia school districts that provides high schoolers with access to interactive modules in the areas of coding, cybersecurity, artificial intelligence, sensors and data visualization. The participating school districts for the 2022-2023 academic year include Cartersville City, Chattooga County, Effingham County, Fayette County, Gordon County, Haralson County, Liberty County, and Walker County. </span></span></span></p><p><span><span><span>The initiative, called the Computer Science for Rural Georgia High Schools Pilot, launched in summer 2022 and has been supported with funding from the State of Georgia. Roughly 400 students have participated in the pilot to date and up to 600 are expected to participate in total. &nbsp;</span></span></span></p><p><span><span><span><span>“This program is increasing the exposure of opportunities in computer science and fields in the areas of science, technology, engineering and mathematics (STEM) for a wider range of students, which is pretty exciting for us,” said STEM@GTRI Director Leigh McCook. </span></span></span></span></p><p><span><span><span>The five modules, which include introduction to coding, advanced coding, principles of cybersecurity, sensors and data visualization, and foundations of artificial intelligence, were developed based on input from the participating school districts and tap into Tech’s areas of expertise. Each module is two weeks in duration and is taught virtually by a Georgia Tech faculty member in collaboration with the classroom teacher, who is in person.</span></span></span></p><p><span><span><span>For the introduction to coding class, students learned the basics of coding and then were able to develop and deploy code to the Georgia Tech Robotarium, which is a remotely accessible swarm robotics research platform that is free and open to anyone. The advanced coding class is based on EarSketch, a free educational programming environment developed at Georgia Tech that is designed to teach coding in two widely used languages, Python and JavaScript, through music composing and remixing. </span></span></span></p><p><span><span><span>The modules on cybersecurity, artificial intelligence and sensors and data visualization are aimed at addressing current workforce development needs in Georgia.&nbsp; </span></span></span></p><p><span><span><span>With an economic impact of nearly $54 billion, Georgia’s technology sector accounts for 6% of the state’s total workforce, according to recent <a href="https://www.cyberstates.org/pdf/CompTIA_Cyberstates_2022.pdf">data</a> from the Computing Technology Industry Association (CompTIA). Georgia’s estimated net tech employment for 2021 was 281,666 workers, a gain of 4,219 net new jobs year-over-year, according to CompTIA’s latest data.&nbsp;&nbsp; </span></span></span></p><p><span><span><span>The number of software, programming, web and quality assurance (QA) occupations led the state for 2021, at 60,863. IT support specialists and repair technicians followed at 25,517; cybersecurity and systems engineers ranked third, at 24,076, per CompTIA. </span></span></span></p><p><span><span><span>After the week-long instruction concluded, students completed a project where they solved a real-life problem facing their communities with the technologies they learned about. Then, Tech faculty and students provided the teams with feedback on their projects.&nbsp; </span></span></span></p><p><span><span><span>“<span>It’s a little bit like a Shark Tank environment, where the students receive professional feedback on their projects,” said CEISMC Director Lizanne DeStefano, who also serves as a professor of psychology at Georgia Tech.</span></span></span></span></p><p><span><span><span><span>Participating teachers said the pilot has given their students the opportunity to make a tangible connection to many valuable computer science topics.&nbsp; </span></span></span></span></p><p><span><span><span><span>“Day one was awesome!,” said Stephanie A. Ratliff, a teacher at Chattooga High School. “I just can’t say thank you enough to GTRI and Georgia Tech for allowing us to be a part of this pilot venture.”</span></span></span></span></p><p><span><span><span><span>Gerald Nelms, a teacher at Bradwell Institute, a high school located in Liberty County, added: “My students were exposed to a wide world of possibilities that exist in computer science. We cannot wait for future collaborative efforts.”&nbsp;&nbsp; </span></span></span></span></p><p><span><span><span><span>Once the pilot concludes at the end of the current fiscal year, DeStefano and McCook said they are eager to scale the program to more districts and create a resource repository for participating districts to draw from at any time.&nbsp; </span></span></span></span></p><p><span><span><span><span>“At the very minimum, we will develop this into an educational resource and continue to host it on our websites,” DeStefano said. “If there is continued funding, then we would be interested in refining the five modules and offering them to a larger number of districts.” </span></span></span></span></p><p><span><span><span>STEM@GTRI is GTRI's K-12 outreach program. Funded by the State of Georgia, the mission of STEM@GTRI is to inspire and engage Georgia educators and students by providing access to experts in STEM fields. CEISMC is a unit with Tech’s Office of the Provost that serves as the primary connection point between faculty and students and the preK-12 STEM education community. </span></span></span></p><p>&nbsp;</p><p>Writer: Anna Akins&nbsp;<br />Designer: Toya Ejike&nbsp;<br />Photo Credit: CEISMC&nbsp;<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia</p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $800 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1681219432</created>  <gmt_created>2023-04-11 13:23:52</gmt_created>  <changed>1686592291</changed>  <gmt_changed>2023-06-12 17:51:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech’s CEISMC and STEM@GTRI have launched a pilot program for rural Georgia school districts that provides high schoolers with access to interactive modules in areas of science, technology, engineering and mathematics.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech’s CEISMC and STEM@GTRI have launched a pilot program for rural Georgia school districts that provides high schoolers with access to interactive modules in areas of science, technology, engineering and mathematics.]]></sentence>  <summary><![CDATA[<p><span><span><span>Georgia Tech’s Center for Education Integrating Science, Mathematics and Computing (CEISMC) and STEM@GTRI have launched a pilot program for rural Georgia school districts that provides high schoolers with access to interactive modules in the areas of coding, cybersecurity, artificial intelligence, sensors and data visualization. The participating school districts for the 2022-2023 academic year include Cartersville City, Chattooga County, Effingham County, Fayette County, Gordon County, Haralson County, Liberty County, and Walker County. </span></span></span></p>]]></summary>  <dateline>2023-04-06T00:00:00-04:00</dateline>  <iso_dateline>2023-04-06T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-04-06 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670493</item>      </media>  <hg_media>          <item>          <nid>670493</nid>          <type>image</type>          <title><![CDATA[School District Map of Rural Computer Science Pilot for 2022-2023]]></title>          <body><![CDATA[<p>A map showing the Georgia school districts that participated in the rural computer science pilot for the 2022-2023 academic year. (Design credit: Toya Ejike). </p>]]></body>                      <image_name><![CDATA[2023_COMM_0406_Georgia Graphic Custom.png]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/04/11/2023_COMM_0406_Georgia%20Graphic%20Custom.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/04/11/2023_COMM_0406_Georgia%20Graphic%20Custom.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/04/11/2023_COMM_0406_Georgia%2520Graphic%2520Custom.png?itok=m1ynDS_L]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[A map showing the Georgia school districts that participated in the rural computer science pilot for the 2022-2023 academic year. (Design credit: Toya Ejike). ]]></image_alt>                    <created>1681217473</created>          <gmt_created>2023-04-11 12:51:13</gmt_created>          <changed>1681218208</changed>          <gmt_changed>2023-04-11 13:03:28</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="167258"><![CDATA[STEM]]></keyword>          <keyword tid="192507"><![CDATA[Computer Science Pilot Program]]></keyword>          <keyword tid="342"><![CDATA[Georgia]]></keyword>          <keyword tid="411"><![CDATA[CEISMC]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667844">  <title><![CDATA[New Approaches, Including Artificial Intelligence, Could Boost Tornado Prediction]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span><span><span>Research using data from a pair of geostationary satellites and a ground-based lightning mapping array could lead to more accurate forecasting of devastating tornadoes spinning off from severe storms. By analyzing dozens of factors, such as the electrical charge patterns within the storms and variations in lightning frequency, researchers are working to identify a “genetic profile” of the thunderstorms likely to produce tornadoes.</span></span></span></p><p><span><span><span>If they’re successful in using an artificial intelligence technique known as machine learning to associate potentially dozens of factors with the formation of tornadoes, the work could dramatically improve the detection of severe storms – and reduce false alarms. </span></span></span></p><p><span><span><span>“This is a great opportunity to apply machine learning to take advantage of the severe storm reports available for the past several years,” said Levi Boggs, a research scientist at the Severe Storms Research Center (SSRC) at the Georgia Tech Research Institute (GTRI). “We can feed all of this information, potentially 30 or 40 different predictors, into the machine learning models and train them to identify patterns that we could potentially use to predict when tornadoes will form. Using AI, we can take on tasks that would be too challenging for humans alone.”</span></span></span></p><p><span><span><span>Using data from their ground-based lightning mapping array, the researchers also are studying “jumps” and “dives” in lightning activity to see how they may help predict the formation of tornadoes.</span></span></span></p><p><span><span><span><strong>Overcoming the Challenges of Radar</strong></span></span></span></p><p><span><span><span>Forecasters now rely on weather radar to identify tornadoes and predict which storms may spin them off. But in areas such as North Georgia, topographical features such as mountains can limit the ability to see lower portions of potentially-dangerous storms, while the time required for radars to update their views can cut into warning times. Electromagnetic interference also can create confusing radar results, and during large severe weather outbreaks stretching across hundreds of miles, there can be multiple storms that must be watched for signs of tornadic activity.</span></span></span></p><p><span><span><span>As a result, the development of tornadoes can be missed, while false alarms may lead citizens to disregard warnings – or wait too long to seek shelter. Based on research conducted so far, Boggs believes warnings based on machine learning techniques could be significantly faster and more accurate – and offer the potential to automate the tracking of the storms.</span></span></span></p><p><span><span><span>“With radar-based methods, there can be a high false alarm rate, as much as 60 or 70 percent,” he said. “At the same time, the probability of detection can be as low as 50 or 60 percent, which means a lot of tornadoes are missed. With these machine-learning techniques, we expect to improve on both detection and false alarm rates.” </span></span></span></p><p><span><span><span><strong>Training Machine Learning with Detailed Storm Reports</strong></span></span></span></p><p><span><span><span>So far, researchers have trained their machine learning system on data from 62 tornadoes resulting from 40 different storms in Georgia. In the Peach State, tornadoes commonly pop up from squall lines of storms, though supercells – larger rotating behemoths more often seen in the Midwest – also bring tornadoes into the state. </span></span></span></p><p><span><span><span>Supercells can spawn more powerful tornadoes – EF3, EF4, and EF5 – which are more dangerous to humans and destructive to property. But squall line tornadoes can also be deadly, even if they create less powerful EF0, EF1, and EF2 tornadoes, and lines of storms capable of producing them may extend across multiple states.</span></span></span></p><p><span><span><span>“One of the main benefits of this machine learning technique is that by using data from the geostationary lightning mapper on the GOES satellite, you would be able to avoid the limitations of radar,” he said. “Using satellite data, you have a huge field of view without the terrain blockages, and you can detect tornadoes over a huge distance – potentially the entire continental United States.”</span></span></span></p><p><span><span><span>Using the technique, Boggs and his colleagues are evaluating as many as 40 different parameters to see which ones may be relevant to predicting tornado formation. Among them is the pattern of electrical charge within the storms, which he compares to a genetic profile. </span></span></span></p><p><span><span><span>“A typical thunderstorm may have two or three charge regions, but the supercells could have a dozen or more separate regions,” he said. “It’s really complicated to see what’s going on with the lightning because those complex charge structures will create different types of discharges. The flash rate can be just noisy.”</span></span></span></p><p><span><span><span>Despite the potential advantages of satellite tornado prediction, Boggs believes forecasters will likely continue to use existing radar techniques, supplementing them with new technology as it develops. GTRI has submitted proposals to funding organizations to continue testing the machine learning tool, which also could be useful to countries that lack the weather radar network available to forecasters in the United States.</span></span></span></p><p><span><span><span><strong>Analyzing Lightning ‘Jumps’ and ‘Dives’</strong></span></span></span></p><p><span><span><span>Satellite data and machine learning aren’t the only approaches SSRC researchers are using to identify where tornadoes and other severe weather will pop up.</span></span></span></p><p><span><span><span>For several years, GTRI has operated the ground-based North Georgia Lightning Mapping Array (NGLMA) that tracks lightning bursts in North Georgia, centered on the Atlanta metropolitan area. Researchers are using radio-frequency emissions recorded by the array to study lightning flashes in an effort to correlate “jumps” – increases in lightning occurrence – and “dives” – reductions in frequency – with the development of severe storms.</span></span></span></p><p><span><span><span>The ground-based array – one of several operating in the United States – provides information not available from satellites, so the two sources are complementary, providing both optical and radio-frequency data.</span></span></span></p><p><span><span><span>The array was deployed by John Trostel, director of the SSRC, and correlates data on electromagnetic energy produced by the lightning bursts with precise timing and location information. The network of 12 ground stations tracks both lightning that interacts with the ground as well as bursts that stay in the clouds – which account for 75 percent of all lightning – providing a detailed map of electrical charge in the atmosphere.</span></span></span></p><p><span><span><span>“What we are looking for is a rapid increase in how many flashes there are over a brief period of time, on the order of a couple of minutes,” said Jessica Losego, an SSRC research meteorologist who is using a NASA-developed algorithm to study the phenomena. “If you see a jump, you can feel somewhat confident that you’re going to soon have some type of severe weather that may include damaging wind, hail, or a tornado. Analyzing this can help with all modes of severe weather, not just tornadoes.”</span></span></span></p><p><span><span><span>Losego is among the weather researchers worldwide who are also studying dives, sudden declines in lightning rates, though it’s not yet clear how – and if – they may help forecasters. The dives in lightning activity may serve as yet another indicator of the strength of a storm and how it may be changing. </span></span></span></p><p><span><span><span><strong>How Georgia’s Severe Weather Is Different</strong></span></span></span></p><p><span><span><span>After a tornado killed a dozen people in North Georgia in 1998, the SSRC was created by the state of Georgia to develop improved means of providing early warning of tornadoes and severe storms. Beyond topographical issues, Georgia’s tornadoes can differ from those of neighboring states in other ways, Losego noted. </span></span></span></p><p><span><span><span>“A lot of our storms come through later in the day, which means there’s less sunlight to provide energy to the storms,” she said. “The storms may start in Mississippi early in the day and may fall apart by the time they get there, but they are still dangerous. Storms that arrive late in the day or evening can make it more difficult to warn citizens who may be asleep when tornadoes are detected.”</span></span></span></p><p><span><span><span>Data gathered by the NGLMA is shared with National Weather Service (NWS) forecasters in Peachtree City, providing an additional source of information for its forecasts.</span></span></span></p><p><span><span><span>“Our goal is to provide another tool that the NWS can use to provide more warning and have more confidence in that warning,” Losego said. “Data from our lightning mapping array goes directly into their systems, and we will share what we learn about using information from jumps and dives that could improve warnings to Georgia citizens.”</span></span></span></p><p><span><span><span>The NGLMA now covers North Georgia. Because the southern part of Georgia is out of the range of the NGLMA network and can have a different set of weather conditions, the researchers would like to establish a second array to track severe storms there.</span></span></span></p><p><span><span><span><strong>Research Supports SSRC Goals</strong></span></span></span></p><p><span><span><span>The SSRC was created through funding from the Georgia Emergency Management Agency (GEMA), the Federal Emergency Management Agency (FEMA), and the state of Georgia to serve as a focal point for severe storm research in Georgia.</span></span></span></p><p><span><span><span>“The SSRC serves the state of Georgia by actively developing alternative methods for detecting and forecasting severe local storms and exploring improvements to existing storm prediction and sensor technology,” said Trostel. “We are utilizing the latest in machine learning, data analysis, and other technologies to support the goals of keeping Georgians safe from severe storms.”</span></span></span></p><p>&nbsp;</p><p>Writer: John Toon (john.toon@gtri.gatech.edu)<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia</p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $800 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p><p>&nbsp;</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1684854201</created>  <gmt_created>2023-05-23 15:03:21</gmt_created>  <changed>1686582149</changed>  <gmt_changed>2023-06-12 15:02:29</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[GTRI researchers are working to utilize an artificial intelligence technique, known as machine learning, that could dramatically improve the detection of severe storms – and reduce false alarms. ]]></teaser>  <type>news</type>  <sentence><![CDATA[GTRI researchers are working to utilize an artificial intelligence technique, known as machine learning, that could dramatically improve the detection of severe storms – and reduce false alarms. ]]></sentence>  <summary><![CDATA[<p><span><span><span>Research using data from a pair of geostationary satellites and a ground-based lightning mapping array could lead to more accurate forecasting of devastating tornadoes spinning off from severe storms. By analyzing dozens of factors, such as the electrical charge patterns within the storms and variations in lightning frequency, GTRI researchers are working to identify a “genetic profile” of the thunderstorms likely to produce tornadoes.</span></span></span></p>]]></summary>  <dateline>2023-05-23T00:00:00-04:00</dateline>  <iso_dateline>2023-05-23T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-05-23 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670855</item>      </media>  <hg_media>          <item>          <nid>670855</nid>          <type>image</type>          <title><![CDATA[Map of Lightning Jumps in Alabama and Georgia]]></title>          <body><![CDATA[<p><em>Researchers studied lightning jumps and dives in long-track tornadoes that occurred in Alabama and Georgia in March 2021. (National Oceanic and Atmospheric Administration image)</em></p>]]></body>                      <image_name><![CDATA[supercells-map_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/05/23/supercells-map_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/05/23/supercells-map_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/05/23/supercells-map_0.jpg?itok=Fo92C3Ys]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Map of Lightning Jumps in Alabama and Georgia]]></image_alt>                    <created>1684849577</created>          <gmt_created>2023-05-23 13:46:17</gmt_created>          <changed>1684849742</changed>          <gmt_changed>2023-05-23 13:49:02</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="154"><![CDATA[Environment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="154"><![CDATA[Environment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="3432"><![CDATA[weather]]></keyword>          <keyword tid="170862"><![CDATA[storm]]></keyword>          <keyword tid="1233"><![CDATA[tornado]]></keyword>          <keyword tid="192657"><![CDATA[tornado prediction]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="1564"><![CDATA[community]]></keyword>          <keyword tid="171151"><![CDATA[State of Georgia]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="177742"><![CDATA[SSRC]]></keyword>          <keyword tid="169457"><![CDATA[Severe Storms Research Center]]></keyword>          <keyword tid="2621"><![CDATA[radar]]></keyword>          <keyword tid="192658"><![CDATA[supercells]]></keyword>          <keyword tid="192659"><![CDATA[North Georgia Lightning Mapping Array]]></keyword>          <keyword tid="192660"><![CDATA[lightning jumps]]></keyword>          <keyword tid="171162"><![CDATA[severe storms]]></keyword>          <keyword tid="191027"><![CDATA[thunderstorm]]></keyword>          <keyword tid="192661"><![CDATA[NGLMA]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667921">  <title><![CDATA[Tech Developer Wins at Independent Game Festival]]></title>  <uid>36418</uid>  <body><![CDATA[<p><span><span><span><span><span><span><span><span>From an early age, Daniel Carr knew exactly what he wanted to do when he grew up. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>“When I was in elementary school and was asked, ‘What do you want to be when you're older?’ my answer was a game developer," he said.</span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>In his final semester at Tech before graduating with a B.S. in computer science, Carr won the Best Student Game award at the Independent Game Festival (IGF) in San Francisco for his adventure game, <em>Slider</em>.</span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>He began studying game development in high school, leading him to eventually enter a game jam –– a competition that tasks participants with creating a game from scratch in a short time. Though he didn't find immediate success in his first contest, Carr kept going. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>The game, a PC title in which players solve puzzles and rearrange maps to help reconnect humanity, emerged from a competition in November 2021. The game received positive feedback after the jam, and while Carr felt like there was more to be done, he nearly let the project fall by the wayside. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>"I remember along the way, there was a lot of doubt in me," he recalled. "I asked myself, ‘Should I carry this through all the way?’ I remember someone telling me that you have to trust yourself at the start of the vision you set out on because while you're working through it, you'll doubt yourself a lot. And, I just did that and kept working on it."</span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>Carr looked to the Tech community for help and pitched the game to the Georgia Tech Video Game Development Club (VGDev) in January 2022. Work on the game continued over the next two semesters, and they submitted <em>Slider</em> to IGF, which receives over 600 entries, later that year. Carr and the team didn't expect a response, but to their surprise, in early January, they were named one of six finalists in the student category. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>Over spring break, Carr and six other VGDev members went to San Francisco for the conference. Carr still didn’t believe that winning was a possibility, so when <em>Slider</em> was announced during the award ceremony, he was genuinely shocked. He took the stage and reflected on the hard work that went into the game's development by nearly 30 individuals over the years.&nbsp; </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>While winning was a highlight of the trip, Carr found himself similarly enthralled with the universal language of gaming. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>"One of the coolest things was seeing how much of an international community there is around game development –– there were all sorts of games from European countries, Latin America, and all over the world. Everyone is making games."</span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span><a href="https://store.steampowered.com/app/1916890/Slider/">A playable demo of <em>Slider</em> is available on Steam</a>, and Carr plans to leave the link active through development in the hopes of expanding the game's reach. As someone who grew up on PC gaming, he knows the platform is accessible to a vast audience. Despite the recent accolades, he explains that the game is not a finished product, but taking his own advice, he plans to trust his vision and keep working on it. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span><span>With one degree in hand, Carr is now interning with Amazon and will return to Tech in the fall to get his master's degree in computational intelligence. He plans to keep game development as a hobby for the time being but admits that he’ll never close the door on pursuing it as a career in the future. </span></span></span></span></span></span></span></span></p><p><span><span><span><span><span><span><span>&nbsp;</span></span></span></span></span></span></span></p>]]></body>  <author>sgagliano3</author>  <status>1</status>  <created>1685128045</created>  <gmt_created>2023-05-26 19:07:25</gmt_created>  <changed>1685713022</changed>  <gmt_changed>2023-06-02 13:37:02</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Daniel Carr recently won an award for the Best Student Game at the recent Independent Game Festival in San Francisco. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Daniel Carr recently won an award for the Best Student Game at the recent Independent Game Festival in San Francisco. ]]></sentence>  <summary><![CDATA[<p><span><span><span><span><span><span><span><span>Daniel Carr recently won an award for the Best Student Game at the recent Independent Game Festival in San Francisco. </span></span></span></span></span></span></span></span></p>]]></summary>  <dateline>2023-05-26T00:00:00-04:00</dateline>  <iso_dateline>2023-05-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-05-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Daniel Carr recently won an award for the Best Student Game at the recent Independent Game Festival in San Francisco. ]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[steven.gagliano@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:steven.gagliano@gatech.edu">Steven Gagliano</a> - Communications Officer&nbsp;</p><p>Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670880</item>          <item>670881</item>      </media>  <hg_media>          <item>          <nid>670880</nid>          <type>video</type>          <title><![CDATA[youtube]]></title>          <body><![CDATA[<p>In his final semester at Tech before graduating with a B.S. in computer science, Daniel Carr won the Best Student Game award at the Independent Game Festival (IGF) in San Francisco for his adventure game, Slider.</p>]]></body>                      <youtube_id><![CDATA[JjcInSnW58s]]></youtube_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <vimeo_id><![CDATA[]]></vimeo_id>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>            <video_url><![CDATA[https://www.youtube.com/watch?v=JjcInSnW58s]]></video_url>            <video_width><![CDATA[]]></video_width>            <video_height><![CDATA[]]></video_height>                    <created>1685129039</created>          <gmt_created>2023-05-26 19:23:59</gmt_created>          <changed>1685472592</changed>          <gmt_changed>2023-05-30 18:49:52</gmt_changed>      </item>          <item>          <nid>670881</nid>          <type>image</type>          <title><![CDATA[Daniel Carr accepts the Best Student Game award at the Independent Game Festival. ]]></title>          <body><![CDATA[<p>Daniel Carr accepts the Best Student Game award at the Independent Game Festival. (Submitted photo)</p>]]></body>                      <image_name><![CDATA[52775683014_a25cf50193_o.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/05/26/52775683014_a25cf50193_o.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/05/26/52775683014_a25cf50193_o.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/05/26/52775683014_a25cf50193_o.jpg?itok=cq6UAoxC]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Daniel Carr accepts the Best Student Game award at the Independent Game Festival ]]></image_alt>                    <created>1685129139</created>          <gmt_created>2023-05-26 19:25:39</gmt_created>          <changed>1685129139</changed>          <gmt_changed>2023-05-26 19:25:39</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://store.steampowered.com/app/1916890/Slider/]]></url>        <title><![CDATA[Slider Demo ]]></title>      </link>          <link>        <url><![CDATA[https://www.gtvgdev.com]]></url>        <title><![CDATA[Georgia Tech Video Game Development Club Website]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42951"><![CDATA[Student Art]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42951"><![CDATA[Student Art]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="109"><![CDATA[Georgia Tech]]></keyword>          <keyword tid="1273"><![CDATA[video game design]]></keyword>          <keyword tid="171043"><![CDATA[SLIDER]]></keyword>          <keyword tid="192708"><![CDATA[Independent Game Festival]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667808">  <title><![CDATA[New $20 Million NSF Award Paves the Way for AI Innovation in Cybersecurity]]></title>  <uid>32045</uid>  <body><![CDATA[<p>Over the next four years a national team of researchers will establish the&nbsp;<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2229876&amp;HistoricalAwards=false">AI Institute for Artificial Cyber Threat Intelligence and Operation</a>&nbsp;(ACTION) through a $20 million award from the&nbsp;<a href="https://new.nsf.gov/news/nsf-announces-7-new-national-artificial">National Science Foundation</a>&nbsp;with the intent of adapting artificial intelligence technologies to cybersecurity practices.</p><p>Wenke Lee, John P. Imlay Jr. chair and professor at the School of Cybersecurity and Privacy, will represent Georgia Tech as one of the co-principal investigators for the project, which aims to improve how essential business technologies are protected from evolving cyber threats.</p><p>“This NSF AI Institute is a really exciting opportunity because it enables us to explore new ideas and develop novel technical approaches and educational content at the intersection of AI and Cybersecurity,” said Lee. “Our team of researchers in multiple disciplines from several leading universities will be collaborating very closely and I expect to learn a lot from them throughout the project.”&nbsp;</p><p>Lee will collaborate with the second co-principal investigator from Georgia Tech,&nbsp;Xiaoming Huo, A. Russell Chandler III professor in the H. Milton Stewart School of Industrial and Systems Engineering. The two will jointly supervise several Ph.D. students and co-develop new course materials and projects to broaden the impact of their research.&nbsp;</p><p>“Cybersecurity research ascends as a groundbreaking sphere in data science, encompassing a myriad of captivating and rigorous topics,” said Huo. “Pioneering innovation remains crucial, and I am eagerly anticipating the opportunities that this grant will bring, ushering in a new epoch in the field.” &nbsp;</p><p>Researchers will work across disciplines to develop new approaches to artificial intelligence that is informed by and works with security experts. The AI tools developed by ACTION will perform security tasks quickly and accurately while anticipating potential moves made by adversaries. The AI will counteract the possible attacks in a way that protects computer network security and ensures people’s safety. &nbsp;</p><p>The work done by ACTION will also include an outreach component. The results from the project are anticipated to innovate education from K-12 to postdoctoral students. Many of the new AI and cybersecurity tools developed will be applied to workforce development, collaboration opportunities among academic organizations, and industry partners. &nbsp;</p><p>Researchers from the University of California, Santa Barbara will take the lead on this project. They will collaborate with Georgia Tech, Purdue University, the University of California, Berkeley, University of Chicago, University of Washington, University of Virginia, Rutgers University, University of Illinois Urbana-Champaign, University of Illinois Chicago, and Norfolk State University. Georgia Tech will receive $1.5 million from this grant.</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1684417542</created>  <gmt_created>2023-05-18 13:45:42</gmt_created>  <changed>1684442424</changed>  <gmt_changed>2023-05-18 20:40:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Two Georgia Tech professors are co-leading a new project to improve how essential business technologies are protected from evolving cyber threats.]]></teaser>  <type>news</type>  <sentence><![CDATA[Two Georgia Tech professors are co-leading a new project to improve how essential business technologies are protected from evolving cyber threats.]]></sentence>  <summary><![CDATA[<p>Two Georgia Tech professors are co-leading a new project funded by a $20 million NSF grant to improve how essential business technologies are protected from evolving cyber threats.</p>]]></summary>  <dateline>2023-05-18T00:00:00-04:00</dateline>  <iso_dateline>2023-05-18T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-05-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>JP Popham, Communications Officer I</p><p>School of Cybersecurity and Privacy</p><p>john.popham@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>670833</item>      </media>  <hg_media>          <item>          <nid>670833</nid>          <type>image</type>          <title><![CDATA[2023_ai_whats_new_graphic_v2.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2023_ai_whats_new_graphic_v2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2023/05/18/2023_ai_whats_new_graphic_v2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/2023/05/18/2023_ai_whats_new_graphic_v2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2023/05/18/2023_ai_whats_new_graphic_v2.jpg?itok=kK71oq7s]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Graphic depicting robotic hand interacting with digital screen]]></image_alt>                    <created>1684417596</created>          <gmt_created>2023-05-18 13:46:36</gmt_created>          <changed>1684417596</changed>          <gmt_changed>2023-05-18 13:46:36</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="362"><![CDATA[National Science Foundation]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="667227">  <title><![CDATA[GTRI Graduate Student Research Fellowship Program Continues to Expand for Third Year]]></title>  <uid>35832</uid>  <body><![CDATA[<p><span><span><span>The Georgia Tech Research Institute (GTRI) solves the most pressing national security problems, from spacecraft innovations to artificial forensics, and has historically sought to partner with Georgia Tech faculty to enhance those solutions. The GTRI Graduate Student Research Fellowship Program (GSFP) is a competitive program for high-caliber Georgia Tech graduate students. Selected academic researchers and graduate students work on research that is aligned with GTRI strategic technology priorities. The GSFP fosters and cultivates long-term relationships between academic faculty and GTRI researchers to fulfill the mission of creating leaders who advance technology and improve the human condition. <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a958b8d1-c4a6-4dc8-b3c2-73ac67d10d28" href="https://gtri.gatech.edu/laboratories">Find out more about the labs at GTRI.</a></span></span></span></p><p><span><span><span><a href="https://coe.gatech.edu/news/2021/06/national-security-research-fueled-partnership">The first eight projects in the inaugural cohort</a>, along with <a href="https://research.gatech.edu/gtri-graduate-student-fellowship-expands">the seven projects chosen last year</a>, have been a great success. In this third year, the fellowship is expanding to include an additional seven projects that will further the research collaboration across Georgia Tech’s schools and colleges.</span></span></span></p><p><span><span><span>“We really want connectivity to manifest through research collaborations, and it’s advantageous for us to reach into the broad wealth of and depth of talent across the academic schools,” said Mark Whorton, GTRI’s chief technology officer. “From the theoretical research done on campus into the applied research we do at GTRI, we're seeking to take those great capabilities and bring applications into the national security space.”</span></span></span></p><p><span><span><span>Across the seven selected fellowship awards for the upcoming academic year, researchers from GTRI labs will co-advise students along with a Georgia Tech faculty member. This year’s projects will lead to innovations in everything from electronic warfare systems, artificial intelligence/machine learning, autonomous systems, and protein sequencing to international policy. </span></span></span></p><h2>Faculty Research Pairs and Proposals&nbsp;</h2><h3><span><span><span><strong>What: Reconfigurable Metasurfaces for High-Power Microwave Systems and Emerging EM Spectrum Operation Concepts</strong></span></span></span></h3><p><span><span><span><strong>Who:</strong>&nbsp;Dr. Nima Ghalichechian, Dr. Joshua Kovitz, Walter Disharoon</span></span></span></p><p><span><span><span><strong>Unit: </strong>School of Electrical and Computer Engineering; Advanced Concepts Laboratory (ACL)</span></span></span></p><p><span><span><span><strong>Why It Matters:</strong> Reconfigurable metasurfaces have the potential to improve high-power microwave (HPM) systems, enabling applications such as adaptive beamforming and beam shaping, frequency tuning, and polarization timing for use in radar, communication systems, directed energy, and other electronic warfare systems. This research proposes to develop reconfigurable metasurfaces using vanadium dioxide (VO2) switch technologies for HPM systems, and demonstrate a reconfigurable reflectarray (RRA) and high-power limiter metasurface.</span></span></span></p><p><span><span><span><span><span>“Phase-change materials offer a completely new paradigm for the ubiquitous RF switch, a fundamental building block in sensor and electronic warfare systems,” said Kovitz and Ghalichechian. “As a part of this joint effort, we plan to design, fabricate, and test novel reconfigurable and high-power microwave structures based on these phase-change materials.”</span></span></span></span></span></p><h3><span><span><span><strong>What: Interactive Decision-making and Resilient Planning for Long-Horizon Collaborative Manipulation in Complex Military Environments</strong></span></span></span></h3><p><span><span><span><strong>Who:</strong> Dr. Ye Zhao, Dr. Stephen Balakirsky, Maxwell Asselmeier</span></span></span></p><p><span><span><span><strong>Unit:</strong> School of Mechanical Engineering; Aerospace Transportation &amp; Advanced Systems Laboratory (ATAS)</span></span></span></p><p><span><span><span><strong>Why It Matters: </strong>Collaborative manipulation, as a class of general-purpose autonomous systems, provides an expansive set of desirable capabilities to perform complex tasks in highly unstructured environments. These autonomous systems could operate in dangerous environments that are inaccessible to first responders, saving labor and reducing the risk to human life. This will open the opportunity of enabling human operators to focus on high-level, critical decisions.</span></span></span></p><p><span><span><span>“<span><span>This fellowship will support human-robot teaming with a robot that has a high level of autonomy along with a sense of touch,” said Balakirsky. “This combination will allow a human operator to provide tasking of dexterous manipulation tasks to the robot without the burden of teleoperation or constant process monitoring. This system has wide-ranging applications from search and rescue to manufacturing.”</span></span></span></span></span></p><h3><span><span><span><strong>What: Trustworthy Edge Systems for Video Analytics: Robustness, Safety, and Resilience</strong></span></span></span></h3><p><span><span><span><strong>Who:</strong> Dr. Ling Liu, Dr. Margaret Loper, Connor Geurin</span></span></span></p><p><span><span><span><strong>Unit:</strong> School of Computer Science; Information and Communications Laboratory (ICL)</span></span></span></p><p><span><span><span><strong>Why It Matters: </strong>Video as an edge Artificial Intelligence (AI) service will be a crucial component in many cyber-physical systems and applications. However, most of the video analytics today are typically done in the Cloud, which incurs overwhelming demand for bandwidth. This research is centered on developing trustworthy edge systems for video analytics, including developing the theory, algorithms, and techniques for boosting the robustness of real-time object detection. This will ensure safety and resilience against different types of disruptions and compromises.</span></span></span></p><p><span><span><span>“The proliferation of mobile computing and Internet of Things has created a paradigm that pushes computing tasks and services from the network core to the network edge,” said Loper. “Pushing AI to the edge is seen as a promising solution for processing the massive amounts of small data generated by these devices. The findings of this research could fundamentally change how AI-enhanced edge systems will be designed, developed, and deployed, and could lead to a new generation of security and safety-enhanced edge systems.”</span></span></span></p><h3><span><span><span><strong>What: Model-based Reinforcement Learning for Policy-perspective Explainable and Trusted Artificial Intelligence</strong></span></span></span></h3><p><span><span><span><strong>Who:</strong> Dr. Sehoon Ha, Dr. Robert Wright, Morgan Byrd</span></span></span></p><p><span><span><span><strong>Units: </strong>School of Interactive Computing; Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER)</span></span></span></p><p><span><span><span><strong>Why It Matters: </strong>The emergence of capable artificial intelligence (AI) that can make sequential strategic decisions via deep reinforcement learning (deep RL) has revolutionized various fields, including computer games and robotic control, but they have not yet impacted safety-critical domains such as power grid control, medical treatment, and autonomous driving and far from real-world deployment. This research investigates scalable model-based RL approaches for explainable and trusted AI to develop explainable AI learning frameworks that can be applied to these safety-critical domains.</span></span></span></p><p><span><span><span>“AI technologies are becoming more and more capable every day and are on the verge of revolutionizing many fields and industries,” said Wright. “However, AI models are prone to mistakes, and their reasoning can be very opaque, leading to a [reasonable] lack of trust. This effort investigates novel explainable AI approaches for Reinforcement Learning (RL) to improve trust and practicality. Our intent is to develop model-based RL algorithms that can explicitly describe why it is making its decisions, visualize or describe what it expects to happen, and provide counterfactual examples for why it chose not to make decisions.” </span></span></span></p><h3><span><span><span><strong>What: Two-dimensional Nanopore Sensors for Real-time, Single Molecule Protein Sequencing</strong></span></span></span></h3><p><span><span><span><strong>Who:</strong> Dr. Eric Vogel, Dr. Katherine Young, Noah Baughman</span></span></span></p><p><span><span><span><strong>Units: </strong>School of Materials Science and Engineering; Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER)</span></span></span></p><p><span><span><span><strong>Why It Matters: </strong>There is a significant need to develop rapid protein sequencing technologies that can be used by the warfighter in the field to identify the impact of biological warfare agents or to provide physiological monitoring to enhance soldier performance. A technology to rapidly sequence the primary and secondary structure of proteins at the single-molecule level in real-time does not currently exist. The objective of this work is to develop a rapid protein sequencing prototype technology based on two-dimensional (e.g., graphene, MoS2) nanopore sensors that can be used by the warfighter in the field and enable future research programs which apply this prototype to perform full protein sequencing.</span></span></span></p><p><span><span><span>“There is a significant need to develop rapid protein sequencing technologies that can be used to identify the impact of biological warfare agents or to provide physiological monitoring to enhance human performance,” said Vogel and Young. “This fellowship will support the fundamental research necessary to develop nanopore electrochemical sensors based on two-dimensional materials to rapidly sequence the primary and secondary structure of proteins at the single-molecule level in real-time.”</span></span></span></p><h3><span><span><span><strong>What: Generating Geopolitics: AI, Disinformation, and the Future of National Security</strong></span></span></span></h3><p><span><span><span><strong>Who:</strong> Dr. Jon Lindsay, Mr. Nicholas Nelson, Dennis Murphy</span></span></span></p><p><span><span><span><strong>Units: </strong>School of Cybersecurity and Privacy, Sam Nunn School of International Affairs, and School of Public Policy; Electronics, Optics, Systems Directorate (EOSD)</span></span></span></p><p><span><span><span><strong>Why It Matters:</strong> The use of Artificial Intelligence/Machine Learning (AI/ML) in national security has the potential to enhance our ability to protect national interests greatly. However, there are also potential challenges and risks associated with this technology, such as the potential for bias or misuse. This research will engage in a multidisciplinary study that will bridge the gap between disparate research fields and reintroduce relevant security-related concepts from the social sciences. This will result in the generation of scientifically-grounded potential use cases for the technology in the support and protection of national interests.</span></span></span></p><p><span><span><span><span><span>“As AI/ML capabilities and use cases continue to evolve, it is critical for defense and national security actors to better innovate, scale, deploy, and integrate AI and autonomy-based technologies to form agile, system-wide solutions,” Nelson and Lindsay said. </span></span></span></span></span></p><h3><span><span><span><strong>What: Unmasking the "Status dilemma/competition" of the triad powers (Russia, China, and United States) in offensive-defensive behavior</strong></span></span></span></h3><p><span><span><span><strong>Who: </strong>Dr. Adam Stulberg, Dr. Theresa Kessler, Megan Litz</span></span></span></p><p><span><span><span><strong>Units: </strong>Sam Nunn School of International Affairs; Advanced Concepts Laboratory (ACL)</span></span></span></p><p><span><span><span><strong>Why it matters: </strong>Unveiling the misperceptions of offensive and defensive signaling is needed in a time when offensive and defensive capabilities are becoming ever more difficult to decipher as technology is evolving. The goal of this research is to shed light on how misinterpreting states’ <em>status</em> can lead to international conflict and expand the initial scholarship that is starting to gain traction within the political science and security studies communities. Understanding and attempting to codify intention would be of great interest to U.S. strategists and tactical planners and aid in answering vital questions of National Security regarding the status of triad powers. Information of this nature will benefit U.S. leadership, departments, and inter-agencies that navigate relations with Russia and China.</span></span></span></p><p><span><span><span><span><span>“This fellowship will support the codification of offensive and defensive signals between Russian, Chinese, and American powers using an open-source literature repository,” said Kessler. “This will help unveil misperceptions and decipher intention.”</span></span></span></span></span></p><p>&nbsp;</p><p>Writers: Georgia Parmelee, Tess Malone (Georgia Tech Research); Charles Domercant, Anna Akins (GTRI)<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia</p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,900 employees, supporting eight laboratories in over 20 locations around the country and performing more than $800 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p><p>&nbsp;</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1681224769</created>  <gmt_created>2023-04-11 14:52:49</gmt_created>  <changed>1681224769</changed>  <gmt_changed>2023-04-11 14:52:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[ This third year’s GTRI Graduate Student Research Fellowship Program (GSFP) will further the research collaboration across Georgia Tech’s schools and colleges, leading to innovations in everything from artificial intelligence to international policy.]]></teaser>  <type>news</type>  <sentence><![CDATA[ This third year’s GTRI Graduate Student Research Fellowship Program (GSFP) will further the research collaboration across Georgia Tech’s schools and colleges, leading to innovations in everything from artificial intelligence to international policy.]]></sentence>  <summary><![CDATA[<p><span><span><span>The GTRI Graduate Student Research Fellowship Program (GSFP) is a competitive program for high-caliber Georgia Tech graduate students. Selected academic researchers and graduate students work on research that is aligned with GTRI strategic technology priorities. The GSFP fosters and cultivates long-term relationships between academic faculty and GTRI researchers to fulfill the mission of creating leaders who advance technology and improve the human condition. </span></span></span></p>]]></summary>  <dateline>2023-03-30T00:00:00-04:00</dateline>  <iso_dateline>2023-03-30T00:00:00-04:00</iso_dateline>  <gmt_dateline>2023-03-30 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><span><span>(Interim) Director of Communications</span></span></p><p><span><span>Michelle Gowdy</span></span></p><p><span><span>Michelle.Gowdy@gtri.gatech.edu</span></span></p><p><span><span>404-407-8060</span></span></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>      </media>  <hg_media>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1808"><![CDATA[graduate students]]></keyword>          <keyword tid="368"><![CDATA[Fellowship]]></keyword>          <keyword tid="192508"><![CDATA[GSFP]]></keyword>          <keyword tid="192509"><![CDATA[GTRI Graduate Student Research Fellowship Program]]></keyword>          <keyword tid="192510"><![CDATA[developing tech leaders]]></keyword>          <keyword tid="2835"><![CDATA[ai]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="188423"><![CDATA[improving the human condition]]></keyword>          <keyword tid="543"><![CDATA[National Security]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="665488">  <title><![CDATA[GTRI's Real-time Intelligent Fusion Service, Forklift Assist Program Could Enhance Warehouse Efficiency, Safety ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>Although warehouses are vital to the success of many organizations, they can also be dangerous to workers and inefficient.</p><p>The Georgia Tech Research Institute (GTRI) is working to solve this challenge by integrating its Real-time Intelligent Fusion Service (RIFS) into its Forklift Assist System (FAS) for warehouse operations to streamline efficiencies and enhance worker safety. RIFS, which is a part of FAS, was built with the cross-platform game engine Unity and produces spatial information about a room and then displays that information as meshes on a device, such as a desktop computer or tablet. FAS also includes a camera system that has additional forklift assistance features.</p><p>This project has been supported by the U.S. Marine Corps and U.S. Navy, and has also been tested at the Marine Corps Logistics Base in Albany, Georgia. &nbsp;&nbsp;&nbsp;</p><p>According to recent <a href="https://www.foodlogistics.com/warehousing/blog/20998744/wasted-motion-can-cost-your-warehouse">estimates</a>, the average U.S. warehouse wastes 6.9 weeks a year on unnecessary motion, which costs the industry $4.3 billion, or 265 million hours of labor annually. Additionally, in 2020, the latest year for which <a href="https://www.bls.gov/iag/tgs/iag493.htm#fatalities_injuries_and_illnesses">statistics</a> are available, there were 5.5 injury and illness cases per 100 full-time workers and 21 fatalities in the warehouse and storage industry. &nbsp;</p><p>RIFS would be incorporated into a warehouse&#39;s order management system and provide real-time information about everything going on in the warehouse. For example, a forklift operator could display RIFS on their tablet device and it would help them navigate to their pick up and drop off locations while ensuring they steer clear of obstacles.</p><p>&quot;The system would know where all the other forklifts and people are in the warehouse and have route planning functionality,&quot; said Stephen Balakirsky, a GTRI principal research scientist who is leading the project. &quot;A lot of warehouses have one-way aisles and it can be difficult for humans to determine the most efficient path to take, but RIFS could automatically determine that for you.&quot;</p><p>RIFS works by creating a grid of a particular environment with individual grid spaces that indicate which areas are traversable or not, explained GTRI Research Scientist Emily Strube, who has expertise with RIFS. The software then utilizes a pathfinding algorithm to determine the effort or &quot;cost&quot; required to move from one grid space to another and maps out the most efficient path possible. People and objects are shown as meshes, or geometric objects, in RIFS. &nbsp;</p><p>For example, in a warehouse, the algorithm would determine how much effort is required for a worker to move from their current position to their pick up or drop off point and outlines the most expedient route, Strube said.</p><p>She added that the algorithm can be adjusted to accommodate changes in a warehouse&#39;s workflow and forklift routes.&nbsp; &nbsp;</p><p>FAS&#39; camera system would help forklift drivers move towards a pallet and secure it without damaging the warehouse&#39;s infrastructure or other pallets and items. The camera system would also have a backup feature to give drivers additional awareness as they move throughout the space in reverse.&nbsp;&nbsp;</p><p>To reduce the risk of forklift loads colliding with the top of doorframes, GTRI is also considering developing and installing sensors near doorways to alert drivers of imminent collisions. &nbsp;</p><p>&quot;There are lots of different safety features that could be added to this project,&quot; Balakirsky said.&nbsp;</p><p>Additionally, GTRI seeks to further utilize RIFS to provide remote inspection and validation of inventory through virtual reality (VR) technology, where the warehouse maps and images would be created by autonomous robots.</p><p>RIFS has been incorporated into several other projects, including GTRI&#39;s Independent Research and Development (IRAD) of the Year winner for fiscal year 2022, which Strube leads. That project seeks to increase the situational awareness of troops on the ground.</p><p>&nbsp;</p><p>Writer: Anna Akins&nbsp;<br />Photo Credit: Stephen Balakirsky, Emily Strube&nbsp;<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees, supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1675696354</created>  <gmt_created>2023-02-06 15:12:34</gmt_created>  <changed>1675696354</changed>  <gmt_changed>2023-02-06 15:12:34</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Tech Research Institute (GTRI) is working to integrate its Real-time Intelligent Fusion Service (RIFS) into its Forklift Assist System (FAS) for warehouse operations to streamline efficiencies and enhance worker safety. ]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Tech Research Institute (GTRI) is working to integrate its Real-time Intelligent Fusion Service (RIFS) into its Forklift Assist System (FAS) for warehouse operations to streamline efficiencies and enhance worker safety. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2023-02-06T00:00:00-05:00</dateline>  <iso_dateline>2023-02-06T00:00:00-05:00</iso_dateline>  <gmt_dateline>2023-02-06 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>665486</item>      </media>  <hg_media>          <item>          <nid>665486</nid>          <type>image</type>          <title><![CDATA[GTRI's Real-Time Intelligent Fusion Service ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Image 7 .jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Image%207%20.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Image%207%20.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Image%25207%2520.jpg?itok=ffyNJR8t]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1675696102</created>          <gmt_created>2023-02-06 15:08:22</gmt_created>          <changed>1675696102</changed>          <gmt_changed>2023-02-06 15:08:22</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="124191"><![CDATA[forklift]]></keyword>          <keyword tid="192073"><![CDATA[workhouse safety]]></keyword>          <keyword tid="5457"><![CDATA[warehouse]]></keyword>          <keyword tid="192074"><![CDATA[warehouse efficiency]]></keyword>          <keyword tid="192075"><![CDATA[RIFS]]></keyword>          <keyword tid="192076"><![CDATA[Real-time Intelligent Fusion Service]]></keyword>          <keyword tid="147121"><![CDATA[U.S. Navy]]></keyword>          <keyword tid="192077"><![CDATA[U.S. Marine Corps]]></keyword>          <keyword tid="145251"><![CDATA[virtual reality]]></keyword>          <keyword tid="148381"><![CDATA[vr]]></keyword>          <keyword tid="7141"><![CDATA[IRAD]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="664512">  <title><![CDATA[Georgia Tech and PNNL Launch Joint Cybersecurity Institute]]></title>  <uid>35832</uid>  <body><![CDATA[<p>The Georgia Institute of Technology (Georgia Tech) and the Pacific Northwest National Laboratory (PNNL) have announced a new collaboration focused on critical infrastructure cybersecurity innovation through the launch of a joint institute, the <a href="https://icaris.gatech.edu/">Institute for Cybersecurity and Resilient Infrastructure Studies (ICARIS)</a>. The goal of the institute is to serve as a leading national resource that delivers the technologies, test beds, and talent necessary to secure the nation&rsquo;s critical infrastructure.&nbsp;</p><p>ICARIS is motivated by the fact that, while the scope of the cyber threat against critical infrastructure is understood, capabilities to address the threat are spread across numerous organizations, involving diverse academic, government, and industry stakeholders. Moreover, there is a critical shortage of skilled personnel with an understanding of both cybersecurity and the underlying physical systems.</p><p>&quot;Georgia Tech is proud to partner with <a href="https://www.pnnl.gov/">PNNL</a> to accelerate vital infrastructure research that will benefit people nationwide,&quot; said Chaouki Abdallah, executive vice president for Research at Georgia Tech. &quot;This collaboration leverages Georgia Tech&rsquo;s and PNNL&rsquo;s complementary strengths, catalyzes new and exciting research directions, and will serve as a national resource for all infrastructure sectors.&quot;</p><p>According to David Manz, PNNL&rsquo;s co-director for the institute, and Georgia Tech Research Institute&rsquo;s (GTRI) Alexa Harter, the primary goals of ICARIS are to: (1) perform translational R&amp;D that moves innovative concepts towards implementation into operational environments; (2) develop the future workforce; and (3) provide advice and solutions to communities, states, federal agencies, and businesses. The institute will guide technology development roadmaps for critical infrastructure sectors while influencing a whole-of-government approach to cybersecurity for these sectors, directly supporting national strategies such as the White House&rsquo;s Industrial Control Systems Cybersecurity Initiative.</p><p>&ldquo;This collaboration brings together the capabilities of PNNL and Georgia Tech to accelerate our combined contributions to the security of the critical infrastructure community,&rdquo; said Deb Gracio, PNNL&rsquo;s Associate Laboratory Director for National Security.</p><p>&ldquo;The partnership will offer a distinctive value proposition founded on three areas of expertise that Georgia Tech and PNNL can uniquely combine: threat intelligence and assessments, deep technical understanding of cybersecurity and engineering domains, such as electric power systems, and an ability to translate threat-informed technologies and technical knowledge into operational impact,&rdquo; according to GTRI Director James Hudgens.&nbsp;</p><p>The collaboration will cement the growing relationship between Georgia Tech and PNNL in cybersecurity and advanced computing, establishing the foundation for long-term research partnerships and major new programs.&nbsp;</p><p>&quot;Ensuring the cybersecurity of the nation&rsquo;s critical infrastructure is of paramount importance if we are to continue to prosper as the result of our investments in technology. This joint institute will leverage Georgia Tech&rsquo;s 20-year-long commitment to cybersecurity to further develop innovative research directions and educational curricula aimed at improving the security and privacy of systems, such as the electric power grid, which are so essential to our everyday lives,&quot; added Michael Bailey, Chair of Georgia Tech&#39;s newly formed <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a>.</p><p>&ldquo;This partnership is an important and exciting step forward in building multidisciplinary teams of researchers who are dedicated to protecting our nation&rsquo;s energy infrastructure so our future energy systems are resilient, reliable, and secure,&rdquo; said Jud Virden, PNNL&rsquo;s Associate Laboratory Director for Energy and Environment.</p><p>The joint institute will build on PNNL&rsquo;s strengths in advanced computing and data science for security, grid controls and cyber defenses, and vulnerability assessment for critical infrastructure. The institute will also provide a pathway to apply PNNL&rsquo;s significant capabilities in resilient controls for the power grid, critical infrastructure test ranges, and AI methods to automate defensive maneuvering and threat discovery.&nbsp;</p><p>&ldquo;This partnership falls directly out of the Georgia Tech Research Next Strategic Plan, which recognizes that we must increasingly partner with a broader spectrum of stakeholders to truly deliver the positive impact we have committed to on our planet&rsquo;s toughest problems,&rdquo; said SEI Executive Director and Research Next co-chair Tim Lieuwen. &ldquo;We are committed to putting in the work to be a great partner.&rdquo;&nbsp;</p><p>Georgia Tech has initiated a national search for the joint institute co-director. Application information can be found <a href="https://careers.gtri.gatech.edu/en-us/job/498167/codirector-institute-for-cybersecurity-and-resilient-infrastructure-science-icaris-cipher">here</a>. Lee Lerner, a GTRI principal research engineer, has been named interim co-director.&nbsp;</p><p>&nbsp;</p><p>GTRI Communications</p><p>Georgia Tech Research Institute</p><p>Atlanta, Georgia USA</p><p><strong>About GTRI</strong>: The Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees, supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, the state, and industry. For more information, please visit&nbsp;<a href="https://www.gtri.gatech.edu/">www.gtri.gatech.edu</a>.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1673285489</created>  <gmt_created>2023-01-09 17:31:29</gmt_created>  <changed>1673285489</changed>  <gmt_changed>2023-01-09 17:31:29</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Institute of Technology (Georgia Tech) and the Pacific Northwest National Laboratory (PNNL) have announced a new collaboration focused on critical infrastructure cybersecurity innovation through the launch of a joint institute.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Institute of Technology (Georgia Tech) and the Pacific Northwest National Laboratory (PNNL) have announced a new collaboration focused on critical infrastructure cybersecurity innovation through the launch of a joint institute.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2023-01-09T00:00:00-05:00</dateline>  <iso_dateline>2023-01-09T00:00:00-05:00</iso_dateline>  <gmt_dateline>2023-01-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>664511</item>      </media>  <hg_media>          <item>          <nid>664511</nid>          <type>image</type>          <title><![CDATA[Institute for Cybersecurity and Resilient Infrastructure Studies (ICARIS)]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[iStock-1252617520-lg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/iStock-1252617520-lg.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iStock-1252617520-lg.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/iStock-1252617520-lg.jpg?itok=2DCYqgoA]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1673285297</created>          <gmt_created>2023-01-09 17:28:17</gmt_created>          <changed>1673285297</changed>          <gmt_changed>2023-01-09 17:28:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="191842"><![CDATA[joint institute]]></keyword>          <keyword tid="184316"><![CDATA[Pacific Northwest National Laboratory]]></keyword>          <keyword tid="183598"><![CDATA[PNNL]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="662293">  <title><![CDATA[GTRI Helps Bring Cybersecurity Training to More Georgia High Schools ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>Amid the growing risk of cyber threats, there is a crucial need to provide the next generation of leaders with the skills to address these challenges. The Georgia Tech Research Institute (GTRI) has played a key role in this effort by bringing <a href="https://www.cyberstartamerica.org/">CyberStart America</a> &ndash; a free online cybersecurity competition that helps high school students discover their talent in cybersecurity &ndash; to more Georgia schools.</p><p>GTRI recently teamed up with the University of North Georgia, the Georgia Cyber Center and the Georgia Department of Education to promote CyberStart within the state.</p><p>For the latest cycle of CyberStart that ran from October 2021 to April 2022, Georgia led the nation in participants, with 6,383 students from 274 Georgia high schools competing. That represents a whopping 564% increase in Georgia student participation compared to the previous cycle. A total of 45,962 students competed nationwide.</p><p>CyberStart is an online game designed to help students learn about cyber topics as they complete fun puzzles and challenges. The game allows students to take on the role of cyber protection agents as they solve cybersecurity-related puzzles and gain exposure to code breaking, programming, networking and digital forensics.</p><p>Students can play the games at their own pace and all students in grades 9-12 are able to participate. &nbsp;</p><p>In addition to building their cyber skills, students also have the opportunity to compete for scholarships and cash prizes.</p><p>The CyberStart America in Georgia taskforce gave out $102,497 in cash prizes to top performing students, schools and districts during the 2021-2022 competition season.</p><p>&quot;There&#39;s a real need for talented cybersecurity professionals in Georgia,&quot; said Tyler Kinner, a GTRI research scientist who is a part of the CyberStart America in Georgia taskforce. &quot;Not only will this program help address the future cyber workforce shortage, but it will also help students become savvier in terms of how they interact with technology.&quot; &nbsp;&nbsp;</p><p>There are over 75 cybersecurity companies in Georgia that generate an estimated $2.6 billion annually, according to recent <a href="https://www.georgia.org/industries/technology/cybersecurity">estimates</a>. Georgia ranked in the top seven states for cybersecurity growth potential by Business Facilities Magazine in 2021.</p><p>Additionally, there <a href="https://ung.edu/cyber-operations/cyberstart-georgia.php">are</a> 700,000 cyber job openings nationally, with about 25,000 of those in Georgia.</p><p>GTRI led the development of a standards matrix to communicate the alignment between CyberStart and the Georgia Department of Education&#39;s curriculum requirements for Georgia high school students. Since its first use during the 2021-2022 school year, other states&rsquo; CyberStart America working groups have followed in developing their own standards-based matrix for this year&rsquo;s competition season.</p><p>&quot;We went through CyberStart to document what knowledge and skills students were learning, and used this to develop a matrix where we demonstrated the alignment between CyberStart and the course standards for Georgia&rsquo;s cybersecurity pathway courses,&rdquo; Kinner explained. &quot;That way, we could communicate to teachers and leaders, &#39;Here&#39;s this acclaimed international platform, and here&rsquo;s how it aligns to our state&#39;s standards.&#39;&quot;</p><p>Kinner noted that the gamified format of CyberStart has helped spur record participation in the program, and he is optimistic that the Georgia participation numbers for the 2022-2023 academic year will be even higher than last year.</p><p>&quot;I think CyberStart has hit a sweet spot in terms of figuring out how to engage high school students with a format that is both educational and entertaining,&quot; Kinner said.</p><p>&nbsp;</p><p>Writer: Anna Akins&nbsp;<br />Photo Credit: University of North Georgia&nbsp;<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees, supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1666137737</created>  <gmt_created>2022-10-19 00:02:17</gmt_created>  <changed>1666137737</changed>  <gmt_changed>2022-10-19 00:02:17</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Tech Research Institute (GTRI) has played a key role in this effort by bringing CyberStart America – a free online cybersecurity competition that helps high school students discover their talent in cybersecurity – to more Georgia schools.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Tech Research Institute (GTRI) has played a key role in this effort by bringing CyberStart America – a free online cybersecurity competition that helps high school students discover their talent in cybersecurity – to more Georgia schools.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-10-18T00:00:00-04:00</dateline>  <iso_dateline>2022-10-18T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-10-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>662292</item>      </media>  <hg_media>          <item>          <nid>662292</nid>          <type>image</type>          <title><![CDATA[2022 CyberStart Amercia High School Student Participants]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[220521-mccb-cyber-awards-0853 (2)_0.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/images/220521-mccb-cyber-awards-0853%20%282%29_0.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/220521-mccb-cyber-awards-0853%20%282%29_0.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/220521-mccb-cyber-awards-0853%2520%25282%2529_0.JPG?itok=DAC44D5I]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1666137586</created>          <gmt_created>2022-10-18 23:59:46</gmt_created>          <changed>1666137586</changed>          <gmt_changed>2022-10-18 23:59:46</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1564"><![CDATA[community]]></keyword>          <keyword tid="1432"><![CDATA[education]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="191469"><![CDATA[CyberStart America]]></keyword>          <keyword tid="189447"><![CDATA[developing future technology leaders]]></keyword>          <keyword tid="191470"><![CDATA[University of North Georgia]]></keyword>          <keyword tid="2029"><![CDATA[Competition]]></keyword>          <keyword tid="191471"><![CDATA[Georgia Cyber Center]]></keyword>          <keyword tid="96461"><![CDATA[Georgia Department of Education]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="661467">  <title><![CDATA[Researchers to Lead Paradigm Shift in Pandemic Prevention with NSF Grant]]></title>  <uid>36319</uid>  <body><![CDATA[<p>One lesson learned from the Covid-19 pandemic is that human behavior is a difficult variable to consider when predicting and preventing disease outbreaks. This challenge is magnified even more considering how different scientific fields conduct, interpret, and present research.</p><p>To overcome these challenges, Georgia Tech researchers form the core of an interdisciplinary, interorganizational team which seeks to prevent disease outbreaks by integrating the study of human behavior with computational data-driven models.&nbsp;</p><p>Calling themselves BEHIVE (BEHavioral Interaction and Viral Evolution), the group recently received a $1 million National Science Foundation (NSF) grant toward multidisciplinary team formation and novel outbreak prevention research.</p><p>&ldquo;Our goal is to bring together all these terrific researchers from different disciplines to help bring a paradigm shift in the science of pandemic prediction and prevention,&rdquo; said&nbsp;<strong>B. Aditya Prakash</strong>, associate professor with Georgia Tech&rsquo;s School of Computational Science and Engineering (CSE).&nbsp;</p><p>&ldquo;While epidemic forecasting is compared to weather forecasting, there is an important difference. Unlike weather, our actions and behavior can change the course of an epidemic.&rdquo;</p><p>Prakash is the principal investigator of the $1 million NSF grant. Fellow BEHIVE members include:</p><ul><li><strong>Pinar Keskinocak</strong>, William W. George Chair and Professor in the H. Milton Stewart School of Industrial and Systems Engineering at Georgia Tech</li><li><strong>Thomas Kingsley</strong>, Assistant Professor of Medicine and Biomedical Informatics at Mayo Clinic</li><li><strong>Shinobu Kitayama</strong>, Robert B. Zajonc Collegiate Professor of Psychology at the University of Michigan</li><li><strong>Ramesh Raskar</strong>, Associate Professor at the Massachusetts Institute of Technology Media Lab</li><li><strong>Liliana Salvador</strong>, Assistant Professor at the University of Georgia&rsquo;s Department of Infectious Diseases</li><li><strong>Joshua Weitz</strong>,&nbsp;Professor and Tom and Marie Patton Chair in the School of Biological Sciences and Co-Director of the Interdisciplinary Ph.D. in Quantitative Biosciences (QBioS) at Georgia Tech</li></ul><p>Prakash emphasized BEHIVE&rsquo;s primary goal to use its interdisciplinary organization to bridge research methodologies between hard and soft sciences.&nbsp;</p><p>He explained that human behavior was underutilized in epidemic science before Covid-19, largely due to data scarcity and underdeveloped computational technologies. Behavioral dynamics encountered during the pandemic, such as social distancing, mask wearing, and vaccine hesitancy, has provided new research and data that now can be considered in models and simulations.</p><p>Here, BEHIVE will develop high fidelity computational models by designing new artificial intelligence and machine learning techniques that bridge human behavior knowledge and traditional epidemiological theory and models.</p><p>&ldquo;It is still an open question of how we can best incorporate human behavior knowledge into the study of pandemics. That is the challenge,&rdquo; Prakash said. &ldquo;Our main idea is to better integrate knowledge from psychology and the humanities into pandemic science using novel computational methods.&rdquo;</p><p>BEHIVE&nbsp;originated when team members met through various workshops held in 2020 and 2021. Prakash was an invited organizer of the&nbsp;National Symposium on Predicting Emergence of Virulent Entities by Novel Technologies (PREVENT).&nbsp;</p><p>PREVENT reported that interdisciplinary collaboration was an obstacle in predicting and preventing pandemics. For example, some vocabularies often don&rsquo;t mean the same thing across disciplines, so a consistent methodology to establish a common language must be developed.</p><p>BEHIVE is custom built to solve these challenges PREVENT revealed. Along with a wealth of knowledge learned through past epidemics, each BEHIVE researcher brings to the group experience working across interdisciplinary lines.&nbsp;</p><p>Among the Georgia Tech researchers alone, Keskinocak&nbsp;<a href="https://news.gatech.edu/news/2020/04/17/pinar-keskinocak-coronavirus-pandemic-and-benefits-social-distancing">interfaced with policymakers and the public</a>&nbsp;on measures to slow Covid-19 spread.&nbsp;</p><p>Prakash&rsquo;s lab led several high-profile Covid-19 forecasting initiatives, including collaboration with the Center for Disease Control and Prevention (CDC).</p><p>Weitz teamed with fellow Georgia Tech researchers with the College of Science, College of Computing, and the Wallace H. Coulter Department of Biomedical Engineering to&nbsp;<a href="https://research.gatech.edu/inqubate-training-program-integrates-modeling-and-data-science-bioscience-phd-students">create a predoctoral training program</a>&nbsp;that integrates computational modeling and data analytics into bioscience.</p><p>Keskinocak, Prakash, and Weitz together are also faculty in the Institute for Data Engineering and Science (IDEaS), one of Georgia Tech&rsquo;s ten interdisciplinary research institutes. IDEaS connects research centers and efforts in foundational areas such as machine learning, high-performance computing, and algorithms.</p><p>BEHIVE&rsquo;s $1 million grant is funded through NSF&rsquo;s&nbsp;<a href="https://beta.nsf.gov/news/predicting-and-preventing-pandemics-goal-new-nsf-awards">Predictive Intelligence for Pandemic Prevention (PIPP)</a>&nbsp;initiative. This program supports high-risk, high-payoff convergent research that aims to identify, model, predict, track, and mitigate the effects of future pandemics.</p><p>According to Prakash, the&nbsp;<a href="https://cpb-us-w2.wpmucdn.com/sites.gatech.edu/dist/9/2679/files/2022/02/NSF-PIPP-2-Report_FINAL_2021-06-25-2.pdf">PREVENT symposium&rsquo;s summary report</a>&nbsp;helped lay the foundation for the PIPP program.</p><p>PIPP is a two-phased initiative in which NSF selects to fund 25 to 30 project teams, including BEHIVE, for eighteen months through phase one. However, this does not necessarily limit PIPP&rsquo;s influence to chosen project teams within academia.</p><p>BEHIVE intends to partner with industry, governmental, and non-profit organizations to expand its interdisciplinary, interorganizational network.&nbsp;</p><p>BEHIVE&rsquo;s nucleus of Georgia Tech researchers connects the group with the CDC, Georgia Department of Public Health, and numerous hospitals across the state. BEHIVE&rsquo;s other researchers also serve in leading roles at non-profits, such as the Pathcheck Foundation, and top hospitals like the Mayo Clinic.</p><p>Along with developing interdisciplinary methodologies, new disease prevention models, and partnering with external organizations, BEHIVE hopes to develop educational training programs. This would ensure their effort last generations to bring about the necessary paradigm change to prevent future pandemics.</p><p>&ldquo;Our initial projects and research the next eighteen months will help us get a sense of research gaps and enlarge our perspective&rdquo; Prakash said. &ldquo;We&rsquo;re approaching PIPP as a science, and we want to lay the foundation of the science by bringing in many people from different fields for the future.&rdquo;</p>]]></body>  <author>Bryant Wine</author>  <status>1</status>  <created>1663873534</created>  <gmt_created>2022-09-22 19:05:34</gmt_created>  <changed>1664197525</changed>  <gmt_changed>2022-09-26 13:05:25</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[B. Aditya Prakash is the principal investigator of a $1 million NSF grant]]></teaser>  <type>news</type>  <sentence><![CDATA[B. Aditya Prakash is the principal investigator of a $1 million NSF grant]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-09-22T00:00:00-04:00</dateline>  <iso_dateline>2022-09-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-09-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Communications Officer<br />bryant.wine@cc.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>661466</item>      </media>  <hg_media>          <item>          <nid>661466</nid>          <type>image</type>          <title><![CDATA[BEHIVE Group]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[pandemic forecasting 2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/pandemic%20forecasting%202.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/pandemic%20forecasting%202.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/pandemic%2520forecasting%25202.jpg?itok=8fOHsYQ5]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[B. Aditya Prakash Research Group]]></image_alt>                    <created>1663873257</created>          <gmt_created>2022-09-22 19:00:57</gmt_created>          <changed>1663873257</changed>          <gmt_changed>2022-09-22 19:00:57</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>      </categories>  <news_terms>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>      </news_terms>  <keywords>          <keyword tid="76231"><![CDATA[Computational Science and Engineering]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="660525">  <title><![CDATA[Eleven U.S. Military Officers Join GTRI's Military Graduate Research Program ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>The Georgia Tech Research Institute (GTRI) has welcomed the fall 2022 cohort into its Military Graduate Research Program (MGRP). MGRP offers U.S military personnel the opportunity to conduct Department of Defense-related research in a GTRI lab while simultaneously obtaining a master&#39;s degree in a science, technology, engineering, or math (STEM)-related program at the Georgia Institute of Technology (Georgia Tech).</p><p>The cohort consists of 11 officers &ndash; two from the U.S. Navy and nine from the U.S. Air Force &ndash; who are working in six of the eight GTRI labs. That brings the participation total in the program up to 17 since its inception in fall 2020. The two Navy officers bring fleet experience from operational tours and all nine of the Air Force officers are recent graduates of the U.S. Air Force Academy, who are on track to pursue careers in pilot training, cyber operations, developmental engineering, operations research, and military meteorology.</p><p>MGRP Chair Mario Mifsud, who serves as the associate lab director of GTRI&#39;s Electro-Optical Systems Laboratory (EOSL), called the program a win-win for all the involved parties, allowing service members to solve applied engineering problems on sponsored, real-world DoD-related projects while providing GTRI with top talent.</p><p>&quot;This fall, GTRI is getting seasoned Navy officers who bring a wealth of military experience and Air Force Academy graduates who are really sharp students,&quot; Mifsud said. &quot;For the participants, they have the opportunity to earn a paid-for master&#39;s degree from a renowned research university on top of gaining real-world experience. Everyone benefits from this program.&quot;</p><p>MGRP funds its graduate degree program through Georgia Tech&#39;s Graduate Student Tuition Remission Plan (GSTRP). Throughout the program, each participant serves as a military graduate research assistant (MGRA), which is the equivalent of a graduate research assistant or graduate teaching assistant (GRA/GTA). The fall 2022 semester is the first time GTRI will cover associated degree fees. Some tuition and fees are also waived due to the MGRA&#39;s military status. Book expenses are the MGRA&#39;s responsibility.</p><p>The MGRP selection process has three components.</p><p>First, the military officer must apply to a service sponsoring program, and the program must put the individual on active duty, Permanent Change of Station (PCS) orders to the Atlanta area to participate in MGRP. At the same time, candidates apply to the Georgia Tech STEM graduate degree program of their choice and must be accepted into their desired program to be eligible to participate. Thirdly, candidates must fill out an MGRP program application, which is available on <a href="https://gtri.gatech.edu/newsroom/georgia-tech-and-gtri-offer-military-fellowship">GTRI&#39;s MGRP webpage.</a></p><p>Once these three steps are completed, the candidate&rsquo;s application package is forwarded to the GTRI labs, divisions, and branches that best align with the candidate&rsquo;s graduate degree program and research area(s) of interest.</p><p>Mifsud said that the lab placements represent a best fit and many participants receive more than one offer from within the different GTRI labs.&nbsp;</p><p>In addition to spreading the word about GTRI&#39;s science and engineering expertise, Mifsud said MGRP builds a lifelong bond with service members and further strengthens GTRI&#39;s relationship with the military &ndash; for whom much of its work is dedicated.</p><p>&quot;People say there is no free lunch,&quot; Mifsud said. &quot;But in this program, there is. All of the players, all of the stakeholders, get something more economically than they would if they were doing things on their own.&quot;</p><p>&nbsp;</p><p>Writer: Anna Akins<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees, supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1661404444</created>  <gmt_created>2022-08-25 05:14:04</gmt_created>  <changed>1661404444</changed>  <gmt_changed>2022-08-25 05:14:04</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Tech Research Institute (GTRI) has welcomed the fall 2022 cohort into its Military Graduate Research Program (MGRP), consisting of 11 officers – two from the U.S. Navy and nine from the U.S. Air Force. ]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Tech Research Institute (GTRI) has welcomed the fall 2022 cohort into its Military Graduate Research Program (MGRP), consisting of 11 officers – two from the U.S. Navy and nine from the U.S. Air Force. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-08-25T00:00:00-04:00</dateline>  <iso_dateline>2022-08-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-08-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>660524</item>      </media>  <hg_media>          <item>          <nid>660524</nid>          <type>image</type>          <title><![CDATA[Eleven U.S. Military Officers Join GTRI's Military Graduate Research Program ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[military_stock.PNG]]></image_name>            <image_path><![CDATA[/sites/default/files/images/military_stock.PNG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/military_stock.PNG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/military_stock.PNG?itok=eZjG0mzH]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1661404152</created>          <gmt_created>2022-08-25 05:09:12</gmt_created>          <changed>1661404152</changed>          <gmt_changed>2022-08-25 05:09:12</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="525"><![CDATA[military]]></keyword>          <keyword tid="191147"><![CDATA[MGRP]]></keyword>          <keyword tid="191148"><![CDATA[Military Graduate Research Program]]></keyword>          <keyword tid="147121"><![CDATA[U.S. Navy]]></keyword>          <keyword tid="2478"><![CDATA[U.S. Air Force]]></keyword>          <keyword tid="191149"><![CDATA[Mario Mifsud]]></keyword>          <keyword tid="167258"><![CDATA[STEM]]></keyword>          <keyword tid="191150"><![CDATA[GSTRP]]></keyword>          <keyword tid="191151"><![CDATA[Georgia Tech&#039;s Graduate Student Tuition Remission Plan]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="659841">  <title><![CDATA[Georgia High Schoolers Gain Real-World STEM Experience at GTRI's Summer Internship Program ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>A poultry processing robot and a facial recognition device that takes classroom attendance were just two of the many projects that high school students from across Georgia worked on during GTRI&#39;s annual summer internship program.</p><p>The five-week program, which was held June 13 to July 22, hosted 65 high school students from 13 Georgia school districts who were selected from an application pool of 487. The students worked under the direction of 34 professionals at the Georgia Tech Research Institute (GTRI), who represented seven of the eight GTRI labs. At the conclusion of the program, all students presented the results of their work in a daylong event for GTRI leadership, mentors, and special guests.</p><p>The ultimate goal of the program is to provide students with real-world experience in the fields of science, technology, engineering, and math (STEM) and to create awareness of future STEM career opportunities.&nbsp;</p><p>&quot;It&#39;s an incredibly rewarding experience to work with such talented students and see what they are able to accomplish in five weeks,&quot; said Therese Boston, a GTRI senior research associate and co-director of the program. &quot;I can&#39;t wait to see how the interns build upon the skills they have learned during their internships in school and in their future careers.&quot;&nbsp;</p><p>The participating students represented the following Georgia school districts: Atlanta Public Schools, Cobb, DeKalb, Dougherty, Douglas, Fayette, Forsyth, Fulton, Gwinnett, Harris, Henry, Houston, and Marietta City Schools.</p><p>Though many participants previously had some experience with STEM-related topics prior to the internship experience, such as coding and robotics, they said the program further strengthened their skill sets in those areas by requiring them to apply that knowledge to tackle real-world challenges designed by GTRI employees who served as mentors. &nbsp;&nbsp;</p><p>For one project, students designed and evaluated modifications for a suction-based robotic end effector, a claw-like device attached to the end of a robot&#39;s arm that interacts with the environment and is capable of picking and placing raw chicken products in a poultry processing facility.</p><p>The project required students to design experiments and utilize computer-aided design (CAD) software, including SolidWorks, to create components on a 3D printer.&nbsp;</p><p>One participant, Kari Britton, who is a student in the Fulton County school system, said gaining exposure to SolidWorks while also observing the real-world applicability of her research was invaluable.</p><p>Another group developed an augmented reality (AR) facial detection program used to accurately detect and register users into a database. The program would be intended primarily for the education field, helping professors keep track of their hectic classrooms - such as recording when students check in and out of class. The students also incorporated a hand-detection feature into the program to detect when a student raises their hand and quickly notify the professor.</p><p>One student in the group, Bhoomi Kotharkar, a student in the Forsyth County school system, said this project not only helped her become more comfortable working with emerging technologies, but it also showed her what a STEM career could look like.&nbsp;&nbsp;</p><p>&quot;One of the most beneficial aspects of the internship was getting hands-on experience with AR, cybersecurity, and cloud computing,&quot; Kotharkar said. &quot;It also showed us what our future could look like if we choose to pursue a STEM career.&quot;</p><p>Robert Clark, a GTRI senior research scientist who served as a program mentor, said in addition to teaching students STEM-focused concepts, the internship also reinforces the importance of teamwork, thinking critically, and asking the right questions.&nbsp;</p><p>&quot;The program offers a number of features that reflect a real workplace,&quot; Clark said. &quot;I think the best thing about STEM@GTRI is that it gives students a chance to learn what it&rsquo;s like to go into a problem in depth, experiencing both the challenge and the satisfaction of really wrapping your mind around technical content.&quot;</p><p><a href="https://www.gtri.gatech.edu/stem">STEM@GTRI</a> is GTRI&#39;s K-12 outreach program. Funded by the State of Georgia, the mission of STEM@GTRI is to inspire and engage Georgia educators and students by providing access to experts in STEM fields.</p><p>&nbsp;</p><p>Writer: Anna Akins<br />Photos: Christopher Moore<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>&nbsp;</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees, supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1659442475</created>  <gmt_created>2022-08-02 12:14:35</gmt_created>  <changed>1659442475</changed>  <gmt_changed>2022-08-02 12:14:35</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A poultry processing robot and a facial recognition device that takes classroom attendance were just two of the many projects that high school students from across Georgia worked on during GTRI's annual summer internship program. ]]></teaser>  <type>news</type>  <sentence><![CDATA[A poultry processing robot and a facial recognition device that takes classroom attendance were just two of the many projects that high school students from across Georgia worked on during GTRI's annual summer internship program. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-08-02T00:00:00-04:00</dateline>  <iso_dateline>2022-08-02T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-08-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>659840</item>          <item>659839</item>      </media>  <hg_media>          <item>          <nid>659840</nid>          <type>image</type>          <title><![CDATA[GTRI's 2022 Summer Internship Program ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2022_0720_K-12 Interns Educational Outreach STEM _PHOTO_COMM_040.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2022_0720_K-12%20Interns%20Educational%20Outreach%20STEM%20_PHOTO_COMM_040.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2022_0720_K-12%20Interns%20Educational%20Outreach%20STEM%20_PHOTO_COMM_040.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2022_0720_K-12%2520Interns%2520Educational%2520Outreach%2520STEM%2520_PHOTO_COMM_040.jpg?itok=gTxzxgH_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1659442152</created>          <gmt_created>2022-08-02 12:09:12</gmt_created>          <changed>1659442152</changed>          <gmt_changed>2022-08-02 12:09:12</gmt_changed>      </item>          <item>          <nid>659839</nid>          <type>image</type>          <title><![CDATA[GTRI Research Engineer William Stuckey]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2022_0720_K-12 Interns Educational Outreach STEM _PHOTO_COMM_039.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2022_0720_K-12%20Interns%20Educational%20Outreach%20STEM%20_PHOTO_COMM_039.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2022_0720_K-12%20Interns%20Educational%20Outreach%20STEM%20_PHOTO_COMM_039.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2022_0720_K-12%2520Interns%2520Educational%2520Outreach%2520STEM%2520_PHOTO_COMM_039.jpg?itok=57S9t_Ei]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1659442027</created>          <gmt_created>2022-08-02 12:07:07</gmt_created>          <changed>1659442027</changed>          <gmt_changed>2022-08-02 12:07:07</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="191001"><![CDATA[high school interns]]></keyword>          <keyword tid="4044"><![CDATA[internship]]></keyword>          <keyword tid="170709"><![CDATA[STEM@GTRI]]></keyword>          <keyword tid="189447"><![CDATA[developing future technology leaders]]></keyword>          <keyword tid="191002"><![CDATA[impact in Georgia]]></keyword>          <keyword tid="14601"><![CDATA[mentorship]]></keyword>          <keyword tid="191003"><![CDATA[Georgia school districts]]></keyword>          <keyword tid="183048"><![CDATA[K-12 outreach]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="659049">  <title><![CDATA[Project Improves Cybersecurity of Global Ship-Tracking System]]></title>  <uid>35832</uid>  <body><![CDATA[<p>Cybersecurity improvements developed by the Georgia Tech Research Institute (GTRI) in collaboration with the U.S. Navy could soon help bolster protection for the Automated Identification System (AIS), which is used to track and identify commercial and military ships around the world. &nbsp;</p><p>AIS uses signals from transponders operating on the ships to help their captains avoid collisions when the vessels are outside of busy ports. Because AIS is based on an open standard developed many years ago, the U.S. Navy&#39;s Battlespace Awareness &amp; Information Operations Program Office (PMW 120) realized the system needed hardening to help address current cybersecurity conditions and expectations.</p><p>GTRI researchers were initially asked to evaluate potential vulnerabilities of the system, and then to develop an add-on software system, called Bifrost, which works with AIS to filter messages from ships, guard against potentially malicious messaging, and provide critical alerts to ship captains. The Bifrost system has been delivered to the Navy&rsquo;s Battlespace Awareness &amp; Information Operations Program Office, and is now undergoing evaluation &ndash; a step on the way to potential deployment.</p><p>&ldquo;The goal of AIS is to avoid collisions, and everyone works together to contribute information about where their ship is and which way they are headed to make sure everyone can predict where they will be,&rdquo; explained Shelby Allen, a GTRI research scientist who led the project. &ldquo;Being able to trust the information being provided is important to ensuring the safety of maritime traffic worldwide. Along with GPS, AIS plays an integral role in how our forces operate across the seas.&rdquo;</p><p>Information for AIS comes from transponders on each ship that provide such information as the GPS-based location coordinates, heading, and speed. The transponders use a common and open protocol, but equipment errors and other factors can affect the accuracy of what&rsquo;s reported. Bifrost helps filter transponder information coming into Navy ships.</p><p>&ldquo;The goal of the application we developed was not to get in the way of the existing system, since it is a critical path for downstream systems,&rdquo; Allen explained. &ldquo;We wanted to look for both accidental issues with the incoming transmissions and the potential for deliberate misuse.&rdquo;</p><p>Because of the critical nature of the communications, the Bifrost system was designed to extract useful information from ship transmissions even if they don&rsquo;t necessarily meet all the specifications of the protocol.</p><p>&ldquo;The majority of what we see that looks like a transmission not abiding by the specifications are accidental formatting issues,&rdquo; he said. &ldquo;Filtering this information needs to have a certain amount of tolerance for what can go wrong and still have the messages provide useful information.&rdquo;</p><p>Bifrost can detect deliberate misinformation, such as location updates that suggest speeds impossible for vessels to attain. &ldquo;Ships can only accelerate and decelerate at certain rates, and there are some examples of egregious misuse of location information,&rdquo; Allen said. &ldquo;One of our goals was to detect messages less likely to be real GPS-based messages.&rdquo;</p><p>Beyond cybersecurity hardening, Bifrost enhances how the system handles emergency alerts, which may not receive sufficient visibility in the original AIS interface.</p><p>&ldquo;There are safety-related messages that by protocol should be addressed immediately,&rdquo; Allen said. &ldquo;We worked to make sure that these alerts had the smallest chance of being an annoyance. When someone did need to review the alerts and needed additional information, we made it as easy as possible to do.&rdquo;</p><p>Because Bifrost was intended to be a working software system with an important safety mission, PMW 120 requested the researchers to carry development further than often happens with research projects. &ldquo;We had to make sure that this was something that could quietly and reliably run for a long time in a performance environment,&rdquo; he explained.</p><p>That reliability and operational testing extended a bit further than Allen originally expected &ndash; to ten days on a U.S. Navy guided-missile destroyer off the coast of California &ndash; and to bunk space reserved for researchers from organizations working on projects that required real-world testing at sea.</p><p>&ldquo;At first, everybody was kind of learning their way around the ship and making sure they weren&rsquo;t in anyone else&rsquo;s way,&rdquo; Allen said. &ldquo;We slept in standard quarters and ate the same food everybody else onboard did. We were in the thick of operations on a Navy ship.&rdquo;</p><p>Below deck, where Bifrost was operating, Allen and GTRI colleague David Myers at first lost track of time.</p><p>&ldquo;One of the things I didn&rsquo;t anticipate ahead of time was how optional it was to be outside,&rdquo; Allen said. &ldquo;When I imagined being on a ship, I imagined a huge deck with people there all the time. That was not true at all. The vast number of people are working beneath the deck, and there are multiple levels. There was a point I realized that it had been 24 hours since I had seen the sun.&rdquo;</p><p>The researchers scheduled times to work with the operators of the system, knew when mealtimes were, participated in safety-related exercises, and took advantage of workout facilities &ndash; which required some adaptation to the rolling of the ship in the waves.</p><p>&ldquo;There were beautiful, starry nights with absolutely no light pollution,&rdquo; he said. &ldquo;Dolphins were following the ship, just like in documentaries. It was a once-in-a-lifetime experience.&rdquo;</p><p>&nbsp;</p><p>Writer: John Toon (John.Toon@gtri.gatech.edu)</p><p>GTRI Communications</p><p>Georgia Tech Research Institute</p><p>Atlanta, Georgia USA</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees, supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1655995983</created>  <gmt_created>2022-06-23 14:53:03</gmt_created>  <changed>1655995983</changed>  <gmt_changed>2022-06-23 14:53:03</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Cybersecurity improvements developed by the Georgia Tech Research Institute (GTRI) in collaboration with the U.S. Navy could soon help bolster protection for commercial and military ships around the world.]]></teaser>  <type>news</type>  <sentence><![CDATA[Cybersecurity improvements developed by the Georgia Tech Research Institute (GTRI) in collaboration with the U.S. Navy could soon help bolster protection for commercial and military ships around the world.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-06-23T00:00:00-04:00</dateline>  <iso_dateline>2022-06-23T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-06-23 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>659047</item>      </media>  <hg_media>          <item>          <nid>659047</nid>          <type>image</type>          <title><![CDATA[GTRI Shelby Allen]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[shelby-allen-selfie.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/shelby-allen-selfie.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/shelby-allen-selfie.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/shelby-allen-selfie.jpg?itok=4jwrbLzS]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1655995281</created>          <gmt_created>2022-06-23 14:41:21</gmt_created>          <changed>1655995281</changed>          <gmt_changed>2022-06-23 14:41:21</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="3773"><![CDATA[navy]]></keyword>          <keyword tid="190831"><![CDATA[AIS]]></keyword>          <keyword tid="190832"><![CDATA[Automated Identification System]]></keyword>          <keyword tid="190833"><![CDATA[ship-tracking system]]></keyword>          <keyword tid="190834"><![CDATA[PMW 120]]></keyword>          <keyword tid="190835"><![CDATA[Bifrost]]></keyword>          <keyword tid="7102"><![CDATA[GPS]]></keyword>          <keyword tid="190836"><![CDATA[U.S.S. Rafael Peralta]]></keyword>          <keyword tid="190837"><![CDATA[missile destroyer]]></keyword>          <keyword tid="924"><![CDATA[national defense]]></keyword>          <keyword tid="190838"><![CDATA[maritime traffic]]></keyword>          <keyword tid="190761"><![CDATA[maritime]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="658907">  <title><![CDATA[GTRI 'Hacks' Solutions for Pressing Cybersecurity Challenges ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>When people think about the game capture the flag, memories of gym class or family trips likely come to mind. The Georgia Tech Research Institute (GTRI) is participating in a slightly different version of this childhood favorite, where teams face off against opponents across the world to tackle real-world cybersecurity issues. &nbsp;</p><p>GTRI&#39;s Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory has participated in capture the flag (CTF) and hackathon events since spring 2021, winning monetary prizes and prestige in the process.</p><p>In March 2021, GTRI won $10,000 and placed 2nd in the U.S. Navy&#39;s <a href="https://www.hackthemachine.ai/">HACKtheMACHINE</a> event, where participants attempted to hack commercial maritime electronics intended for laboratory use to test their vulnerabilities. In December 2021, GTRI was a top 4% finisher in the U.S. Air Force and U.S. Space Force&#39;s <a href="https://hackasat.com/">Hack-a-Sat 2 </a>event, where participants learned how to reduce vulnerabilities in space systems and make them more secure. GTRI in May 2022 placed in the top 5% of the final round of the Air Force and Space Force&#39;s Hack-a-Sat 3 competition.</p><p>Though the terms &ldquo;hackathons&rdquo; and &ldquo;CTFs&rdquo; are often used interchangeably, CTFs refer to team-based competitions in which participants use cybersecurity tools and techniques to find hidden clues or flags. The team that finds the most clues or flags, which are hidden in purposefully-vulnerable programs or websites, during the event wins. Hackathons, meanwhile, are events in which developers, designers, and even non-technical people collaborate to build new programs and technologies and do not necessarily involve vulnerability discovery. Most hackathons and CTFs are open to all students, researchers, and professionals across the world.</p><p>Chris Roberts, a GTRI principal research engineer who leads CIPHER&#39;s Embedded Cyber Techniques branch, said CTFs allow students and faculty of all skill levels at Georgia Tech and GTRI to work together to address issues impacting the cybersecurity field.&nbsp;&nbsp;</p><p>&quot;CTFs involve challenges that represent real-world issues,&quot; Roberts said. &quot;What I really like about them is they give seasoned engineers the ability to impart knowledge on more junior-level engineers. Both groups can work together and learn from each other.&quot;&nbsp;</p><p>Many CTF events require participants to figure out how to secure legacy technology systems against sophisticated cyber threats.</p><p>Pointing to the example of satellites, which are central to the Hack-a-Sat contests, Roberts said many of these systems are prime targets for cyberattacks because they often use obsolete equipment and may not receive regular security updates. The importance of securing satellites holds relevance for advancing national security. Satellites are especially crucial for military operations in the U.S. and across the world, providing geolocation and navigation services, target detection, missile warning and adversary activity tracking.</p><p>&quot;Satellites are high-tech pieces of equipment, but a lot of them were launched decades ago when cybersecurity wasn&#39;t as much of a concern,&quot; Roberts said. &nbsp;</p><p>In addition to exposing participants to relevant cybersecurity issues, Roberts said hackathons and CTFs reinforce the importance of teamwork and problem solving that extend into the workplace.&nbsp;&nbsp; &nbsp;</p><p>&quot;These events require participants to figure out how to approach a problem, break it down into bite-sized chunks, and test their theories,&quot; Roberts said. &quot;When I hire a full-time research engineer at GTRI, I&#39;m looking for their ability to problem solve. I can teach them the technical side of things, but problem solving is much more difficult to learn.&quot;</p><p>Randi Thorson, a GTRI research engineer who earned an M.S. in cybersecurity from Georgia Tech in 2022, said she most enjoys the &quot;rush of&quot; finding flags during competitions and thinking outside the box when testing systems for vulnerabilities. Thorson has participated in CTFs and hackathons at Tech and GTRI for one year.</p><p>&quot;I think CTFs are important because they teach you to look for vulnerabilities,&quot; Thorson said. &quot;So, when you&#39;re designing a product, you know not only some of the mitigations that need to be put in place to design a secure system, but they also teach you the out of box thinking that an adversary will use to exploit the product.&quot;</p><p>Similarly, Kennon Bittick, a GTRI research scientist, said CTFs and hackathons help people who are new to computer security ease into the field by solving unique problems and just having fun.</p><p>Bittick is a Georgia Tech double alum who earned his undergraduate degree in computer science in 2015 and a graduate degree in computer science in 2018. He has participated in hackathons and CTFs at Tech and GTRI since his freshman year of college.&nbsp;</p><p>&quot;The thing I like most is getting a challenge for a system I have never heard of before and being able to quickly do a deep dive, learn about the system, and solve the problem,&quot; Bittick said. &quot;To me, it evokes the classic hacker ethos of quickly learning something cool and making something work.&quot;</p><p>&nbsp;</p><p>Writer: Anna Akins<br />Photos: Ethan Trewhitt<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>The&nbsp;<a href="https://gtri.gatech.edu/"><strong>Georgia Tech Research Institute (GTRI)</strong></a>&nbsp;is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees, supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1655304077</created>  <gmt_created>2022-06-15 14:41:17</gmt_created>  <changed>1655304077</changed>  <gmt_changed>2022-06-15 14:41:17</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Tech Research Institute (GTRI) is participating in hackathon events to tackle real-world cybersecurity issues.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Tech Research Institute (GTRI) is participating in hackathon events to tackle real-world cybersecurity issues.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-06-15T00:00:00-04:00</dateline>  <iso_dateline>2022-06-15T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-06-15 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>658906</item>      </media>  <hg_media>          <item>          <nid>658906</nid>          <type>image</type>          <title><![CDATA[GTRI principal research engineer Chris Roberts]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GTRI Chris Roberts_PNG.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/GTRI%20Chris%20Roberts_PNG.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/GTRI%20Chris%20Roberts_PNG.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/GTRI%2520Chris%2520Roberts_PNG.png?itok=R5v31kC1]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1655303748</created>          <gmt_created>2022-06-15 14:35:48</gmt_created>          <changed>1655303748</changed>          <gmt_changed>2022-06-15 14:35:48</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="130"><![CDATA[Alumni]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="130"><![CDATA[Alumni]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1564"><![CDATA[community]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="61371"><![CDATA[Hackathon]]></keyword>          <keyword tid="176094"><![CDATA[CIPHER]]></keyword>          <keyword tid="99921"><![CDATA[Capture the Flag]]></keyword>          <keyword tid="190801"><![CDATA[Embedded Cyber Techniques]]></keyword>          <keyword tid="190802"><![CDATA[Hack-a-Sat]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="648392">  <title><![CDATA[Modeling Finds Relaxing Covid-19 Safety Protocols During Vaccination Period Risky]]></title>  <uid>35692</uid>  <body><![CDATA[<p>A new mathematical simulation has concluded that the continued practice of mask wearing and social distancing during ongoing vaccinations could help stem a potential surge in Covid-19 cases, particularly as more infectious variants emerge.</p><p>The study was conducted collaboratively by researchers at the Georgia Institute of Technology, the University of North Carolina (UNC), and North Carolina State University (NCSU) and the findings published in the research journal JAMA Network Open. The study methods were based on a mathematical simulation originally developed at Georgia Tech.&nbsp;</p><p>The study evaluated how many Covid-19 cases could be avoided in the Tar Heel State if more people get vaccinated and continue to follow mask and physical distancing guidelines. As of June 3, North Carolina has had 1 million reported cases of Covid-19 and more than 13,000 recorded deaths.</p><p>&ldquo;The main takeaway from the paper is that while the increasing vaccine coverage in the U.S. has a positive impact, we are not really there yet. We still need to follow preventive measures such as mask wearing,&rdquo; said contributing author <a href="https://www.isye.gatech.edu/users/pinar-keskinocak">Pinar Keskinocak</a>, the William W. George Chair and Professor in the H. Milton Stewart School of Industrial and Systems Engineering at Georgia Tech and co-founder and director of the <a href="https://chhs.gatech.edu/">Center for Health and Humanitarian Systems</a>.</p><p>The caution is well founded when the researchers account for viral mutations, including the variant currently dominant in the United States that was initially identified in the UK and was associated with the surge in Michigan. There, as recently as May 2, the state averaged nearly 3,500 cases a day, according to a June 2 story in <a href="https://www.bridgemi.com/michigan-health-watch/coronavirus-tracker-what-michigan-needs-know-now">Bridge Michigan</a>.</p><p>According to one scenario from the simulation, which was populated with data from the state of North Carolina, if 75% of the population gets fully vaccinated but continues to wear masks and socially distance,&nbsp; there is a sustained decline down to very few new Covid-19 cases over a six-month period.&nbsp; But, if only 25% of the population gets fully vaccinated and does not adhere to these non-pharmaceutical interventions (NPIs), there could be a steady increase in daily Covid-19 cases, peaking around 8,000 before there is another decline.</p><p>Keskinocak points to the <a href="https://chhs-gt.shinyapps.io/georgiavaccines/">Georgia Covid-19 Vaccination Dashboard</a> that tracks county-level differences in vaccination rates based on race as further evidence of the need for caution.</p><p>&ldquo;Our dashboard shows that there has been high variability in the level of vaccination in different geographic regions and communities,&rdquo; she said. &ldquo;So even if we say over half of U.S. adults are vaccinated, it&rsquo;s not uniform across the entire country. This further raises concerns about quickly lifting the NPIs.&rdquo;</p><p>Julie Swann, department head, North Carolina State University&rsquo;s Fitts Department of Industrial and Systems Engineering, and long-time research collaborator with Keskinocak, concurs. &ldquo;Current variants are more infectious, and there are still locations with less than 30% of the population vaccinated.&rdquo;</p><p>Swann adds that ongoing spread &ldquo;endangers people now. It also increases the chance of a future mutation that could increase the risk even to people who are vaccinated.&rdquo;&nbsp;<br />Swann and Keskinocak are two of three researchers who co-founded Georgia Tech&rsquo;s Center for Health and Humanitarian Systems in 2007, the year they developed a comprehensive, agent-based simulation model for pandemic flu, which has since been at the core of their modeling efforts for Covid-19. Over the years the two industrial engineers have collaborated closely to advance the model and make results available to decision makers as new pandemics emerged.&nbsp; &nbsp;</p><p>&ldquo;Julie and I have been working on infectious disease modeling for over a decade now. We had developed this agent-based model for pandemic flu and then when Covid-19 hit, Georgia Tech adapted that model to Covid-19 and shared it with Julie&rsquo;s team at NC State who then modified the model to test additional scenarios and calibrated it with North Carolina data,&rdquo; Keskinocak said.</p><p>&ldquo;I am grateful that Pinar and I had spent such a long time trying to understand pandemics and improving the science behind them,&rdquo; Swann added. &ldquo;If we had not invested that time, we would not be able to have such a fast turnaround and the high participation level that we have this year.&rdquo;</p><p>According to Keskinocak, the simulation model is extremely detailed &ndash; in essence, it recreated demographics of the population down to the state&rsquo;s household size, and even individuals&rsquo; workflow, to give a clear picture of how people move from one geographic area to another.&nbsp;</p><p>&nbsp;&ldquo;The model is flexible and can change based on the research question being asked, including the current research question, &lsquo;What is the impact of lifting NPIs in increasing vaccine coverage?&rsquo;&rdquo;</p><p>Swann credited the close partnership with public health partners in Georgia and North Carolina, as well as their work under a grant funded by the Centers for Disease Control and Prevention and the Council for State and Territorial Epidemiologists, with the speed of developing models to test interventions during the pandemic.&nbsp;</p><p>&ldquo;It&rsquo;s really key because sometimes we get additional ideas or research questions from the stakeholders with whom we interact,&rdquo; Swann said.</p><p>Both researchers emphasized the critical role students played in advancing these models under tight deadlines while juggling coursework. Between them they estimate more than two dozen graduate students across the partnering institutions have been engaged in the Covid-19 modeling work since the pandemic began. The two also were integral in establishing a professional education HHSCM certificate program.</p><p>&nbsp;# # #</p><p>The Georgia Institute of Technology, or Georgia Tech, is a top 10 public research university developing leaders who advance technology and improve the human condition.<br />The Institute offers business, computing, design, engineering, liberal arts, and sciences degrees. Its nearly 40,000 students, representing 50 states and 149 countries, study at the main campus in Atlanta, at campuses in France and China, and through distance and online learning.</p><p>As a leading technological university, Georgia Tech is an engine of economic development for Georgia, the Southeast, and the nation, conducting more than $1 billion in research annually for government, industry, and society.</p><p><strong>Writer: </strong>Anne Wainscott-Sargent</p>]]></body>  <author>Anne Sargent</author>  <status>1</status>  <created>1624657439</created>  <gmt_created>2021-06-25 21:43:59</gmt_created>  <changed>1653584976</changed>  <gmt_changed>2022-05-26 17:09:36</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new mathematical simulation has concluded that the continued practice of mask wearing and social distancing during ongoing vaccinations could help stem a potential surge in Covid-19 cases, particularly as more infectious variants emerge.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new mathematical simulation has concluded that the continued practice of mask wearing and social distancing during ongoing vaccinations could help stem a potential surge in Covid-19 cases, particularly as more infectious variants emerge.]]></sentence>  <summary><![CDATA[<p>The study evaluated how many Covid-19 cases could be avoided in North Carolina if more people get vaccinated and continue to follow mask and physical distancing guidelines. As of June 3, North Carolina has had 1 million reported cases of Covid-19 and more than 13,000 recorded deaths. The study found that while increasing vaccine coverage in the U.S. has had a positive impact, people still need to follow preventive measures such as mask wearing.</p>]]></summary>  <dateline>2021-06-25T00:00:00-04:00</dateline>  <iso_dateline>2021-06-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-06-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Study Advises Caution in Face of No Universal Coverage and More Infectious Variants as States Seek to Avoid a Surge in Covid Cases]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tracey.reeves@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Tracey Reeves - Research News</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>648391</item>      </media>  <hg_media>          <item>          <nid>648391</nid>          <type>image</type>          <title><![CDATA[Researchers Pinar Keskinocak and Julie Swann]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Pinar and Julieresized.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Pinar%20and%20Julieresized.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Pinar%20and%20Julieresized.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Pinar%2520and%2520Julieresized.png?itok=mfwmd_t-]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1624656300</created>          <gmt_created>2021-06-25 21:25:00</gmt_created>          <changed>1624702300</changed>          <gmt_changed>2021-06-26 10:11:40</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="184289"><![CDATA[covid-19]]></keyword>          <keyword tid="188185"><![CDATA[vaccine coverage model]]></keyword>          <keyword tid="755"><![CDATA[public health]]></keyword>          <keyword tid="188186"><![CDATA[mask wearing]]></keyword>          <keyword tid="84481"><![CDATA[modeling &amp; simulation]]></keyword>      </keywords>  <core_research_areas>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="658185">  <title><![CDATA[Your Next Personal Assistant Could Be a Drone]]></title>  <uid>35832</uid>  <body><![CDATA[<h3>Imagine you&rsquo;re a college student cramming for a test in your dorm room. It&#39;s getting late, and you realize you still need to make a trip across campus to pick up supplies from the school bookstore and find a bite to eat.</h3><p>What if there was a way for the school supplies and food to be delivered right to your dorm &ndash; not by car or foot, but by drone?</p><p>One class that is part of the Vertically Integrated Projects (VIP) Program at the Georgia Tech Research Institute (GTRI) and Georgia Tech could soon turn that idea into a reality.</p><p>The class, called Experimental Flights, is developing a drone delivery network that would allow students on Georgia Tech&#39;s campus in Atlanta to place orders for items such as school supplies and food through a mobile app, and have a drone deliver those items to a secure locker station close to their dorm. The app would have a similar look and feel to the app used for popular ridesharing services and students could use it to view wait times for the next available drone, track their package, and receive a unique code to access their purchase.</p><p>Michael Mayo, a GTRI senior research engineer who is the lead instructor for the class, said his initial goal is to roll out the drone delivery network to students at Georgia Tech and then to consider other locations later on.</p><p>&quot;We&rsquo;ve been working on this kind of network for a couple of years now and have leveraged knowledge from a lot of different disciplines at Tech &ndash; including aerospace engineering, mechanical engineering, and computer science,&quot; Mayo said. &quot;Success for this project would be for us to develop a fully-functional drone delivery network on Georgia Tech&#39;s campus that would serve as a model for future drone delivery networks across the country and world.&quot;</p><p>VIP is an education program supported by Tech and GTRI that allows undergraduate and graduate students to earn academic credit for working with faculty on projects they don&#39;t typically encounter in a classroom setting.</p><p>Student teams work closely with faculty advisors and graduate student mentors. Classes are held once a week, though team members usually hold additional meetings outside of class. Prospective students who are interested in joining the program can apply to a team that interests them on <strong><a href="https://www.vip.gatech.edu/vip-vertically-integrated-projects-program">Tech&#39;s VIP website</a></strong>.</p><h2>Diversity of Thought</h2><p>The Experimental Flights class attracts a diverse group of class years and majors.</p><p>For the spring 2022 semester, the course included 33 undergraduate students ranging from first years to fourth years with the following majors: aerospace engineering, mechanical engineering, electrical engineering, and computer science. Twenty-one of the 33 students took the class in a previous semester.</p><p>One of those students is Catherine Heaton, a fourth-year aerospace engineering major who has participated in the Experimental Flights class since the fall 2020 semester. Heaton said working with a diverse group of students has enabled her to apply the concepts she has learned from her major to solve real-world issues, while also gaining experience developing hardware systems that supports emerging technologies.</p><p>&quot;I&#39;m on our class&#39; hardware team, so I help assemble all of the parts of the drone and also work a little bit with 3D software modeling,&quot; Heaton said. &quot;There&#39;s a lot of new technologies coming out &ndash; whether it&#39;s drones, or other plane-related things &ndash; and they all have so much potential.&quot;</p><p>Another student, Tim Boyer, a third-year electrical engineering major who has also been a member of the class since fall 2020, said he most enjoys VIP&#39;s interdisciplinary focus and getting the chance to tinker with drones.</p><p>&quot;I really enjoy working with mechanical engineering and computer science majors to make a project come together,&quot; Boyer said. &quot;It&#39;s also great because I have always been interested in drones, so this class is a great outlet to play around with that kind of hardware.&quot;</p><p>VIP Programs are now active in over 40 universities, with more than 4,500 students participating per term around the globe. The entire Georgia Tech VIP program currently serves 84 VIP teams involving more than 200 faculty and over 1,500 students. GTRI has 13 VIP teams that involve roughly 40 faculty members.</p><h2>Preparing for Launch</h2><p>Mayo&#39;s class has assembled a few drone prototypes with the help of drone assembly kits and 3D printing.</p><p>The cost to create one drone is under $1,000, and each prototype can currently carry packages that weigh up to 2 pounds, according to Mayo.</p><p>&quot;The cost of drones, batteries and other associated components continue to decrease, which makes the economics of this type of delivery system more and more favorable,&quot; Mayo said.</p><p>Drone delivery offers several benefits to traditional car-based services, including the potential for reduced greenhouse gas emissions as smaller and lighter packages are transported via drones instead of delivery trucks. This alternative delivery method could also reduce roadway congestion and lower the risk of car accidents. Drone delivery could also enable greater route flexibility, resulting in consumers receiving their packages sooner.</p><p>Beyond package delivery, drones are useful in disaster relief settings when organizations need to send goods to places with restricted access, and also in military settings to help ground troops collect key intelligence and not risking helicopter crews to deliver supplies.</p><p>The Experimental Flights class has successfully completed initial flight testing for their drones in a controlled environment that has been approved by the Georgia Tech Police Department and demonstrated the drones&#39; ability to transport small packages. The class has also constructed a prototype package locker that can securely store multiple packages and that the drone can directly drop packages into.</p><p>The class is currently designing the mobile app for end users and a flight control center to manage drone operation. The path the drone takes through campus for each delivery will be automatically generated using an algorithm designed by the class. The algorithm has been designed to optimize the drone&#39;s flight path to ensure maximum safety by avoiding flight over people while also reducing delivery times when possible. Drones will fly themselves autonomously to their destination during normal operation.</p><p>Mayo noted a fully-operational drone would transmit real-time telemetry and live video streams to the flight control center at all times, and in the event of an emergency, a human operator would assume manual control of the drone. Packages will be secured with both an electromagnet and with the landing gear of the drone itself during transport to reduce the risk of a package becoming dislodged during flight. Rotor cowlings will be added to the drones to minimize the chance of human contact with the rotors &ndash; or a fanlike component that drones rely on for propulsion and control &ndash; during normal operation and in the event that a drone flies off its approved path.</p><p>Before implementing a drone delivery network on campus, the class would need to gain approval from campus administrators and the Federal Aviation Administration (FAA).</p><p>&quot;Special preparation will also need to be made to get FAA approval to fly the drones beyond visual line of sight, which is a requirement for most drone operations,&quot; Mayo said.</p><p>Once the drone delivery system becomes fully operational, the only initial cost to students would be the items that they order, Mayo said. An additional delivery cost, similar to those for food delivery services such as DoorDash and Uber Eats, could be included later on.</p><p>Looking ahead, the class aims to perform flight tests where the drone would pick up a sample package and deliver the item to a locker station in one trip.</p><h2>Beyond the Classroom</h2><p>Mayo&#39;s class is currently seeking corporate collaborations to apply their drone delivery concept to areas such as inventory management and more widespread package delivery. His class is currently collaborating with U.S. furniture company Steelcase to study the use of drones for indoor and outdoor inventory management.</p><p>Mayo said he considers a collaboration between students and companies to be a win-win for both groups. Companies are able to build relationships with students who have in-demand skills and who could be hired as entry-level employees. Students, meanwhile, are able to receive feedback from experienced engineers and network with a company that could serve as a potential employment opportunity.</p><p>&quot;There are so many advantages to VIP that extend well beyond the classroom,&quot; Mayo said.</p><p>&nbsp;</p><p>Writer: <a href="mailto:anna.akins@gtri.gatech.edu" target="_blank">Anna Akins</a><br />Photos: Christopher Moore<br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>&nbsp;</p><p>The <strong><a href="https://gtri.gatech.edu">Georgia Tech Research Institute (GTRI)</a></strong> is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1652444869</created>  <gmt_created>2022-05-13 12:27:49</gmt_created>  <changed>1652444869</changed>  <gmt_changed>2022-05-13 12:27:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Imagine you’re a college student cramming for a test in your dorm room. What if there was a way for the school supplies and food to be delivered right to your dorm – not by car or foot, but by drone? ]]></teaser>  <type>news</type>  <sentence><![CDATA[Imagine you’re a college student cramming for a test in your dorm room. What if there was a way for the school supplies and food to be delivered right to your dorm – not by car or foot, but by drone? ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-05-13T00:00:00-04:00</dateline>  <iso_dateline>2022-05-13T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-05-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>658184</item>          <item>658182</item>          <item>658183</item>      </media>  <hg_media>          <item>          <nid>658184</nid>          <type>image</type>          <title><![CDATA[Georgia Tech Student Catherine Heaton]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2022_.05_VIP-PROGRAM-AI-DRONE__PHOTO_033-crop.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2022_.05_VIP-PROGRAM-AI-DRONE__PHOTO_033-crop.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2022_.05_VIP-PROGRAM-AI-DRONE__PHOTO_033-crop.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2022_.05_VIP-PROGRAM-AI-DRONE__PHOTO_033-crop.jpg?itok=hxoJgORd]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1652444518</created>          <gmt_created>2022-05-13 12:21:58</gmt_created>          <changed>1652444518</changed>          <gmt_changed>2022-05-13 12:21:58</gmt_changed>      </item>          <item>          <nid>658182</nid>          <type>image</type>          <title><![CDATA[GTRI senior research engineer Michael Mayo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[michael-mayo-2_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/michael-mayo-2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/michael-mayo-2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/michael-mayo-2_0.jpg?itok=Jb2L2fzx]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1652444320</created>          <gmt_created>2022-05-13 12:18:40</gmt_created>          <changed>1652444320</changed>          <gmt_changed>2022-05-13 12:18:40</gmt_changed>      </item>          <item>          <nid>658183</nid>          <type>image</type>          <title><![CDATA[GTRI's Experimental Flights VIP class]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2022_.05_VIP PROGRAM AI DRONE__PHOTO_036.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2022_.05_VIP%20PROGRAM%20AI%20DRONE__PHOTO_036.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2022_.05_VIP%20PROGRAM%20AI%20DRONE__PHOTO_036.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2022_.05_VIP%2520PROGRAM%2520AI%2520DRONE__PHOTO_036.jpg?itok=vaoaV-Ry]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1652444420</created>          <gmt_created>2022-05-13 12:20:20</gmt_created>          <changed>1652444420</changed>          <gmt_changed>2022-05-13 12:20:20</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="136"><![CDATA[Aerospace]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="136"><![CDATA[Aerospace]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="132741"><![CDATA[Michael Mayo]]></keyword>          <keyword tid="30661"><![CDATA[VIP]]></keyword>          <keyword tid="167441"><![CDATA[student research]]></keyword>          <keyword tid="184573"><![CDATA[vertically integrated projects]]></keyword>          <keyword tid="1051"><![CDATA[Computer Science]]></keyword>          <keyword tid="516"><![CDATA[engineering]]></keyword>          <keyword tid="1325"><![CDATA[aerospace]]></keyword>          <keyword tid="190613"><![CDATA[campus drone]]></keyword>          <keyword tid="187353"><![CDATA[drone]]></keyword>          <keyword tid="190614"><![CDATA[Experimental Flights class]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="657150">  <title><![CDATA[AF2Complex: Researchers Leverage Deep Learning to Predict Physical Interactions of Protein Complexes]]></title>  <uid>35575</uid>  <body><![CDATA[<p>From the muscle fibers that move us to the enzymes that replicate our DNA, proteins are the molecular machinery that makes life possible.</p><p>Protein function heavily depends on their three-dimensional structure, and researchers around the world have long endeavored to answer a seemingly simple inquiry to bridge function and form:&nbsp;if you know the building blocks of these molecular machines, can you predict how they are assembled into their functional shape?</p><p>This question is not so easy to answer. With complex structures dependent on intricate physical interactions, researchers have turned to artificial neural network models &ndash; mathematical frameworks that convert complex patterns into numerical representations &ndash; to predict and &ldquo;see&rdquo; the shape of proteins in 3D.</p><p>In a new&nbsp;<a href="https://www.nature.com/articles/s41467-022-29394-2" target="_blank">paper</a>&nbsp;published in&nbsp;<em>Nature Communications</em>, researchers at Georgia Tech and&nbsp;<a href="https://www.ornl.gov/" target="_blank">Oak Ridge National Laboratory</a>&nbsp;build upon one such model,&nbsp;<a href="https://www.deepmind.com/research/highlighted-research/alphafold" target="_blank">AlphaFold 2</a>, to not only predict the biologically active conformation of individual proteins, but also of functional protein pairings known as complexes.</p><p>The work could help researchers bypass lengthy experiments to study the structure and interactions of protein complexes on a large scale, said&nbsp;<a href="https://biosciences.gatech.edu/people/jeffrey-skolnick" target="_blank">Jeffrey Skolnick</a>, Regents&rsquo; Professor and Mary and Maisie Gibson Chair in the&nbsp;<a href="https://biosciences.gatech.edu/" target="_blank">School of Biological Sciences</a>&nbsp;and one of the corresponding authors of the study, adding that computational models such as these could mean big things for the field.&nbsp;</p><p>If these new computational models are successful, Skolnick said, &ldquo;it could fundamentally change the way biological molecular systems are studied.&rdquo;</p><p><strong>Primed for Protein Prediction</strong></p><p>Created by London-based artificial intelligence lab&nbsp;<a href="https://www.deepmind.com/" target="_blank">DeepMind</a>, AlphaFold 2 is a deep learning neural network model designed to predict the three-dimensional structure of a single protein given its amino acid sequence. Skolnick and fellow corresponding author,&nbsp;<a href="https://biosciences.gatech.edu/people/mu_gao" target="_blank">Mu Gao</a>, senior research scientist in the School of Biological Sciences, shared that the Alphafold 2 program was&nbsp;<a href="https://www.nature.com/articles/d41586-020-03348-4" target="_blank">highly successful</a>&nbsp;in blind tests occurring at the 14<sup>th&nbsp;</sup>iteration of the Community Wide Experiment on the Critical Assessment of Techniques for Protein Structure Prediction, or&nbsp;<a href="https://predictioncenter.org/casp14/index.cgi" target="_blank">CASP14</a>, a bi-annual competition where researchers around the globe gather to put their computational models to the test.&nbsp;</p><p>&ldquo;To us, what is striking about AlphaFold 2 is that it not only makes excellent predictions on individual protein domains (the basic structural or functional modules of a protein sequence), but it also performs very well on protein sequences composed of multiple domains,&rdquo; Skolnick shared. And so with the ability to predict the structure of these complicated, multi-domain proteins, the research team set out to determine if the program could go a little further.&nbsp;</p><p>&ldquo;The physical interactions between different [protein] domains of the same sequence are essentially the same as the interactions gluing different proteins together,&rdquo; Gao explained.&nbsp;&ldquo;It quickly became clear that relatively simple modifications to AlphaFold 2 could allow it predict the structural models of a protein complex.&rdquo; To explore different strategies,&nbsp;<a href="https://davinan.github.io/dna/" target="_blank">Davi Nakajima An</a>, a fourth-year undergraduate in the School of Computer Science, was recruited to join the team&rsquo;s effort.</p><p>Instead of plugging in the features of just one protein sequence into AlphaFold 2 per its original design, the researchers joined the input features of multiple protein sequences together. Combined with new metrics to evaluate the strength of interactions among probed proteins, their new program&nbsp;<a href="https://github.com/FreshAirTonight/af2complex" target="_blank">AF2Complex</a>&nbsp;was created.</p><p><strong>Charting New Territory</strong></p><p>To put AF2Complex to the test, the researchers&nbsp;partnered with the high-performance computing center,&nbsp;<a href="https://pace.gatech.edu/" target="_blank">Partnership for an Advanced Computing Environment</a>&nbsp;(PACE), at Georgia Tech,&nbsp;and charged the model with predicting the structures of protein complexes it had never seen before. The modified program was able to correctly predict the structure of over twice as many protein complexes as a more traditional method called docking. While AF2Complex only needs protein sequences as input, docking relies on knowing individual protein structures beforehand to predict their combined structure based on complementary shapes.</p><p>&ldquo;Encouraged by these promising results, we extended this idea to an even bigger problem, which is to predict interactions among multiple arbitrarily chosen proteins, e.g., in a simple case, two&nbsp;arbitrary proteins,&rdquo; shared Skolnick.</p><p>In addition to predicting the structure of protein complexes, AF2Complex was charged with identifying which of over 500 pairs of proteins were able to form a complex at all. Using newly designed metrics, AF2Complex outperformed conventional docking methods and AlphaFold 2 in identifying which of the arbitrary pairs were known to experimentally interact.</p><p>To test AF2Complex on the proteome scale, which encompasses an organism&rsquo;s entire library of the proteins that can be expressed, the researchers turned to the&nbsp;<a href="https://www.olcf.ornl.gov/summit/" target="_blank">Summit Oak Ridge Leadership Computing Facility</a>, the world&rsquo;s second largest supercomputing center. &ldquo;Thanks to this resource, we were able to apply AF2Complex to about 7,000 pairs of proteins from the bacteria&nbsp;<em>E. coli</em>,&rdquo; Gao shared.&nbsp;</p><p>In that test, the team&rsquo;s new model not only identified many pairs of proteins known to form complexes, but it was able to provide insights into interactions &ldquo;suspected but never observed experimentally,&rdquo; Gao said.&nbsp;</p><p>Digging deeper into these interactions revealed a potential molecular mechanism for protein complexes&nbsp;that are&nbsp;particularly important for energy transport. These protein complexes are known to carry hemes, essential metabolites giving blood dark red color. Using AF2Complex&rsquo;s predicted structural models, <a href="https://cmb.ornl.gov/jerry-m-parks/" target="_blank">Jerry M. Parks</a>, a senior research and development staff scientist at Oak Ridge National Laboratory and a collaborator in the study, was able to place hemes at their suspected reaction sites within the structure. &ldquo;These computational models now provide insights into the molecular mechanisms for how this biomolecular system works,&rdquo; Gao said.&nbsp;</p><p>&ldquo;Deep learning is changing the way one studies a biological system,&rdquo; Skolnick added. &ldquo;We envision methods like AF2Complex will become powerful tools for any biologist who would like to understand molecular mechanisms of a biosystem involving protein interactions.&rdquo;</p><p><strong>AF2Complex is an open-source tool available to the public and can be downloaded&nbsp;</strong><a href="https://github.com/FreshAirTonight/af2complex" target="_blank"><strong>here</strong></a><strong>.</strong></p><p><em>This work was supported in part by the DOE Office of Science, Office of Biological and Environmental Research (DOE DE-SC0021303) and the Division of General Medical Sciences of the National Institute Health (NIH R35GM118039). DOI:&nbsp;</em><a href="https://doi.org/10.1038/s41467-022-29394-2" target="_blank"><em>https://doi.org/10.1038/s41467-022-29394-2</em></a></p>]]></body>  <author>adavidson38</author>  <status>1</status>  <created>1649688143</created>  <gmt_created>2022-04-11 14:42:23</gmt_created>  <changed>1650287452</changed>  <gmt_changed>2022-04-18 13:10:52</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A computational tool developed to predict the structure of protein complexes – the molecular machinery that makes life possible – is lending new insights into the biomolecular mechanisms of their function. ]]></teaser>  <type>news</type>  <sentence><![CDATA[A computational tool developed to predict the structure of protein complexes – the molecular machinery that makes life possible – is lending new insights into the biomolecular mechanisms of their function. ]]></sentence>  <summary><![CDATA[<p>Proteins are the molecular machinery that makes life possible, and researchers have long been interested in a key trait of protein function: their three-dimensional structure.&nbsp;&nbsp;A new study by Georgia Tech and Oak Ridge National Laboratory details a computational tool able to predict the structure of protein complexes &ndash; and lends new insights into the biomolecular mechanisms of their function.</p>]]></summary>  <dateline>2022-04-18T00:00:00-04:00</dateline>  <iso_dateline>2022-04-18T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-04-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[A computational tool developed to predict the structure of protein complexes – the molecular machinery that makes life possible – is lending new insights into the biomolecular mechanisms of their function. ]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[davidson.audra@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Writer:&nbsp;</strong><a href="mailto:davidson.audra@gatech.edu">Audra Davidson</a><br />Communications Officer<br />College of Sciences at Georgia Tech</p><p><strong>Editor:&nbsp;</strong>Jess Hunt-Ralston<br />Director of Communications<br />College of Sciences at Georgia Tech</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>657354</item>          <item>657142</item>          <item>657144</item>          <item>657143</item>      </media>  <hg_media>          <item>          <nid>657354</nid>          <type>image</type>          <title><![CDATA[Researchers Jeffrey Skolnick and Mu Gao at the Engineered Biosystems Building at Georgia Tech. (Photo: Jess Hunt-Ralston)]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2022 04 Jeffrey Skolnick and Mu Gao - Biosci research copy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2022%2004%20Jeffrey%20Skolnick%20and%20Mu%20Gao%20-%20Biosci%20research%20copy.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2022%2004%20Jeffrey%20Skolnick%20and%20Mu%20Gao%20-%20Biosci%20research%20copy.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2022%252004%2520Jeffrey%2520Skolnick%2520and%2520Mu%2520Gao%2520-%2520Biosci%2520research%2520copy.jpg?itok=IgFWtGVk]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1650045007</created>          <gmt_created>2022-04-15 17:50:07</gmt_created>          <changed>1650045007</changed>          <gmt_changed>2022-04-15 17:50:07</gmt_changed>      </item>          <item>          <nid>657142</nid>          <type>image</type>          <title><![CDATA[A 3D rendering of a protein complex structures predicted from protein sequences by AF2Complex. Credit: Mu Gao.]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[AF2Complex_PredictedProteins-01.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/AF2Complex_PredictedProteins-01.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/AF2Complex_PredictedProteins-01.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/AF2Complex_PredictedProteins-01.png?itok=q9mhy61w]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[A 3D rendering of the structures of three protein complexes, predicted from protein sequences by AF2Complex.]]></image_alt>                    <created>1649684817</created>          <gmt_created>2022-04-11 13:46:57</gmt_created>          <changed>1649684817</changed>          <gmt_changed>2022-04-11 13:46:57</gmt_changed>      </item>          <item>          <nid>657144</nid>          <type>image</type>          <title><![CDATA[The initial development of AF2Complex was done at the Partnership for an Advanced Computing Environment (PACE) computing center of Georgia Tech, pictured here in the Coda Data Center. Credit: Paul Manno/PACE.]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[hive_img_8791.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/hive_img_8791.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/hive_img_8791.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/hive_img_8791.jpg?itok=NrwWNTYK]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A row of computer servers illuminated with blue light in a white hallway.]]></image_alt>                    <created>1649685349</created>          <gmt_created>2022-04-11 13:55:49</gmt_created>          <changed>1649685349</changed>          <gmt_changed>2022-04-11 13:55:49</gmt_changed>      </item>          <item>          <nid>657143</nid>          <type>image</type>          <title><![CDATA[The Summit supercomputing center at Oak Ridge National Laboratory. Credit: Oak Ridge National Laboratory.]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2018-P01537.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2018-P01537.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2018-P01537.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2018-P01537.jpg?itok=3jIBhyXG]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1649684925</created>          <gmt_created>2022-04-11 13:48:45</gmt_created>          <changed>1649684925</changed>          <gmt_changed>2022-04-11 13:48:45</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://github.com/FreshAirTonight/af2complex]]></url>        <title><![CDATA[Download AF2Complex]]></title>      </link>          <link>        <url><![CDATA[https://research.gatech.edu/ai-tool-pairs-protein-pathways-clinical-side-effects-patient-comorbidities-suggest-targeted-covid]]></url>        <title><![CDATA[AI Tool Pairs Protein Pathways with Clinical Side Effects, Patient Comorbidities to Suggest Targeted Covid-19 Treatments]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1275"><![CDATA[School of Biological Sciences]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="190340"><![CDATA[AlphaFold 2]]></keyword>          <keyword tid="175987"><![CDATA[protein structure]]></keyword>          <keyword tid="108061"><![CDATA[Oak Ridge National Laboratory]]></keyword>          <keyword tid="11937"><![CDATA[Jeffrey Skolnick]]></keyword>          <keyword tid="20381"><![CDATA[Mu Gao]]></keyword>          <keyword tid="9502"><![CDATA[Biomolecular]]></keyword>          <keyword tid="166882"><![CDATA[School of Biological Sciences]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="187423"><![CDATA[go-bio]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="657211">  <title><![CDATA[William H. Robinson Named GTRI Deputy Director of Research for ICSD]]></title>  <uid>35832</uid>  <body><![CDATA[<p>The Georgia Tech Research Institute (GTRI) is pleased to announce that our search for the new GTRI Deputy Director for Research for the Information and Cyber Sciences Directorate (ICSD) is complete. On April 18, William H. Robinson, Ph.D., will assume the role of ICSD Director and begin leading two of GTRI&rsquo;s labs: the <a href="https://www.gtri.gatech.edu/laboratories/information-and-communications-laboratory">Information and Communications Laboratory</a> (ICL) and <a href="https://www.gtri.gatech.edu/laboratories/cybersecurity-information-protection-and-hardware-evaluation-research">Cybersecurity, Information Protection, and Hardware Evaluation Research</a> (CIPHER) Lab. William will manage research portfolios that span GTRI, and he will also join the executive council, which strategically guides GTRI.</p><p>Before joining GTRI, William served as Professor of Electrical Engineering and the Vice Provost for Academic Advancement at Vanderbilt University. There, he led the Security and Fault Tolerance Research Group, whose mission is to design, model, verify, and implement robust computing systems that positively benefit stakeholders with consumer, defense, industrial, and medical applications. He also co-led the Explorations in Diversifying Engineering Faculty Initiative (EDEFI). That initiative investigates the institutional, technical, social, and cultural factors that affect decision-making, career choices, and career satisfaction for doctoral students, doctoral candidates, postdoctoral researchers, and faculty from engineering and computing who have been marginalized by race and/or gender.</p><p>William has an expansive portfolio of research, publications, scholarly work, presentations, and awards. While at Vanderbilt University, he was involved in research for sponsors including the Defense Advanced Research Projects Agency (DARPA), the Defense Threat Reduction Agency (DTRA), and the National Science Foundation (NSF). His research related to national security includes: (1) radiation-hardened electronics for satellite and missile systems, (2) hardware trust and assurance for integrated circuits and third-party intellectual property, (3) cyber security with intrusion detection systems, and (4) resilience for unmanned aerial systems and mobile ad hoc networks. In 2015 and in 2016, William served as the General Chair for the IEEE International Symposium on Hardware‑Oriented Security and Trust (HOST), which convenes a robust community of researchers from academia, government, and industry.</p><p>William holds a B.S. in Electrical Engineering from the Florida Agricultural and Mechanical University (FAMU) as well as a M.S. in Electrical Engineering and Ph.D. in Electrical and Computer Engineering from Georgia Tech.</p><p>A national search firm provided a diverse selection of internal and external candidates, and GTRI&rsquo;s search committee worked diligently to find the best candidate to fill this pivotal role. Additionally, representatives from GTRI&rsquo;s Talent Management Department, Tineke Battle and Kim Campbell, oversaw the entire search process. The search committee contained voices from across GTRI and Georgia Tech: &nbsp;</p><ul><li>Keith McBride (GTRI Committee Chair)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</li><li>Julia Kubanek (EVPR)</li><li>Jeff Sitterle (GTRI)</li><li>Alexa Harter (GTRI)</li><li>Tommer Ender (GTRI)</li><li>Sheila Isbell (GTRI)</li><li>Clayton Kerce (GTRI)</li><li>Ken Allen (GTRI)&nbsp;</li><li>Kennedy Oyoo (GTRI)</li><li>Gary LaRue (GTRI)</li><li>Brendan Saltaformaggio (ECE)</li><li>Diane Barney (OSP)</li></ul><p>Don Davis served as the interim Deputy Director for Research for the Information and Cyber Sciences Directorate from May 2021 &ndash; April 2022.&nbsp;Upon William&rsquo;s arrival, Don will focus on his role leading the Electronics, Optics, Systems Directorate (EOSD).</p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1649777946</created>  <gmt_created>2022-04-12 15:39:06</gmt_created>  <changed>1649782270</changed>  <gmt_changed>2022-04-12 16:51:10</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The search for the new GTRI Deputy Director for Research for the Information and Cyber Sciences Directorate (ICSD) is complete, and on April 18, William H. Robinson, Ph.D., will assume the role. ]]></teaser>  <type>news</type>  <sentence><![CDATA[The search for the new GTRI Deputy Director for Research for the Information and Cyber Sciences Directorate (ICSD) is complete, and on April 18, William H. Robinson, Ph.D., will assume the role. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2022-04-12T00:00:00-04:00</dateline>  <iso_dateline>2022-04-12T00:00:00-04:00</iso_dateline>  <gmt_dateline>2022-04-12 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>657209</item>      </media>  <hg_media>          <item>          <nid>657209</nid>          <type>image</type>          <title><![CDATA[William Robinson, GTRI Deputy Director for Research for the Information and Cyber Sciences Directorate]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[William Robinson.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/William%20Robinson.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/William%20Robinson.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/William%2520Robinson.jpg?itok=oJV_mx0W]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1649777455</created>          <gmt_created>2022-04-12 15:30:55</gmt_created>          <changed>1649777455</changed>          <gmt_changed>2022-04-12 15:30:55</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="2435"><![CDATA[ECE]]></keyword>          <keyword tid="190343"><![CDATA[ICSD]]></keyword>          <keyword tid="190344"><![CDATA[Information and Cyber Sciences Directorate]]></keyword>          <keyword tid="190345"><![CDATA[faculty appointment]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="653739">  <title><![CDATA[Georgia Tech Leads Effort to Strengthen State’s Defense Manufacturing Industry ]]></title>  <uid>28137</uid>  <body><![CDATA[<p>The global supply chain has been rocked by disruptions triggered largely by the coronavirus pandemic, resulting in a cascade of shortages on a host of products ranging from computer chips to medications.&nbsp;&nbsp;</p><p>But supply chain disruptions also highlight the potential vulnerabilities in the U.S. manufacturing sector&rsquo;s critical segments like defense.</p><p>To help manufacturers across the state, the Georgia Institute of Technology has launched the Georgia Manufacturing 4.0 Consortium to work with those businesses in defense and related industries become more resilient and less susceptible to supply chain disruptions. The Consortium, which will begin accepting members in&nbsp;April 2022, will work with Georgia defense manufacturers to incorporate cybersecurity protocols, smart technologies such as sensor packs, machine learning, artificial intelligence, and other best practices under Industry 4.0 technology standards.</p><p>Led by Aaron Stebner, associate professor in the&nbsp;<a href="https://www.me.gatech.edu/">George W. Woodruff School of Mechanical Engineering</a>&nbsp;and the&nbsp;<a href="https://www.mse.gatech.edu/">School of Materials Science and Engineering</a>, the Consortium is an 18-month pilot funded by a Department of Defense Office of Local Defense Community Cooperation (OLDCC) grant of nearly $1 million. Georgia Tech is working in partnership with Spelman College, the Technical College System of Georgia, and the Georgia Department of Economic Development, under the grant to develop workforce, training manuals, a curriculum, and to support businesses in adapting to economic and technological changes that emerge at a much more rapid pace today.</p><p>&ldquo;It&rsquo;s a cooperative effort that&rsquo;s really focused on helping to get modern technologies to these Georgia manufacturers. This is about establishing a community of manufacturers who all want to move forward but don&rsquo;t have the bandwidth or capabilities do it individually,&rdquo; Stebner said.</p><p>The Consortium has three goals. The first is to increase the manufacturing defense supply chain&rsquo;s resilience and diversification. That will allow those companies to pivot quickly in response to demand and let non-defense-related industries enter the supply chain at critical junctures. The second goal is to work with Georgia manufacturers in adopting new technologies and address challenges that put those businesses at risk.</p><p>Lastly, the Consortium is to be a conduit that helps small- and medium-sized manufacturers test out innovations using Georgia Tech resources such as the Advanced Manufacturing Pilot Facility, connect manufacturers with each other, and potentially unlock new markets and collaboration opportunities.</p><p>While the focus is on defense manufacturing, the Consortium is open to all manufacturers.</p><p>&ldquo;We want to help as many manufacturers as we can, to grow a bigger pie that helps everybody, lowers risk, and allows companies to be part of building innovative solutions&rdquo; Stebner said.</p><p>&nbsp;</p><p><strong>Manufacturing Supports Georgia Economy</strong></p><p><a href="https://www.nam.org/state-manufacturing-data/2021-georgia-manufacturing-facts/">National Association of Manufacturers data</a>&nbsp;show that manufacturing accounts for $61.1 billion in economic activity, roughly 10% of Georgia&rsquo;s total output. The industry includes more than 6,600 firms that employ nearly 400,000.</p><p>At $14 billion a year, Georgia is ranked 13<sup>th</sup>&nbsp;in federal defense spending. Roughly 1,200 manufacturers in the state are in defense or related industries. Those include information technology companies that support cybersecurity, wireless communications, and other innovations that are critically essential to Industry 4.0 in defense manufacturing.</p><p>University partners from the Technical College System of Georgia and Spelman College will look to take the Consortium findings and data from the work they do with member companies to create educational programming and workforce training.&nbsp;</p><p>Today, there is a need for more workers in machine learning and other aspects of advanced manufacturing, as well as a need to change perceptions of manufacturing, especially in rural parts of the state, Stebner explained.</p><p>To that end, the Technical College System of Georgia could develop programming for students within its two-year education curriculum. It also has a mobile manufacturing unit that could be taken to rural parts of the state and used as a tool to highlight opportunities in manufacturing and dispel misconceptions about the industry.</p><p>The all-women&rsquo;s Spelman College, one of the nation&rsquo;s premier historically black colleges and universities,&nbsp;launched an extended reality program in the fall of 2020. That program aims to integrate art, technology, and narrative on a gaming platform which is familiar and engaging for students.&nbsp;Those students will develop the technical skills to develop games, create immersive virtual experiences, and develop visual simulations for research, education, and training.</p><p>For Consortium members, Spelman&rsquo;s extended reality&nbsp;program can be used to help turn research data gathered from them into workforce training and development modules.</p><p>&ldquo;Spelman has a long history of graduating women in the natural sciences, and that history has recently led the Department of Defense to distinguish the College as a Center of Excellence for educating women in STEM,&rdquo; said Jerry Volcy, a Spelman professor and co-director of the Spelman Innovation Lab.</p><p>The extended reality program furthers Spelman&rsquo;s goal to increase the technological readiness of its graduates.</p><p>&ldquo;Spelman has a long record of forging pathways for women of color into new spaces. Today, these spaces include extended reality, defense and, to some extent, manufacturing research,&rdquo; Volcy said. &ldquo;From the College&rsquo;s perspective, participation in the Consortium has the dual potential of creating and discovering new pathways into these industries while immediately providing real-world applications laboratory for the developing extended reality program.&rdquo;</p><p>&nbsp;</p><p><strong>Fulfilling Georgia Tech&rsquo;s Mission&nbsp;</strong></p><p>Within Georgia Tech, the&nbsp;<a href="https://gamep.org/">Georgia Manufacturing Extension Partnership</a>&nbsp;and the&nbsp;<a href="http://research.gatech.edu/manufacturing">Georgia Tech Manufacturing Institute</a>&nbsp;will support Consortium efforts.</p><p>The Consortium reflects Georgia Tech&rsquo;s broader mission to further its Advanced Manufacturing Initiative, said <a href="https://research.gatech.edu/george-white">George White</a>, Georgia Tech&rsquo;s interim vice president of Industry Collaboration.</p><p>&ldquo;The anticipated research impact envisioned through the Defense Manufacturing Consortium will strengthen Georgia Tech&rsquo;s positioning in enabling major public private collaborations,&rdquo; White said. &ldquo;The advent of the Consortium represents the opportunity to convene key stakeholders from government, academics, and industry to innovate and solve the most challenging problems in manufacturing.&rdquo;</p>]]></body>  <author>Péralte Paul</author>  <status>1</status>  <created>1639664904</created>  <gmt_created>2021-12-16 14:28:24</gmt_created>  <changed>1639666128</changed>  <gmt_changed>2021-12-16 14:48:48</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Department of Defense grant enables collaboration with Spelman College, Technical College System of Georgia, and the Georgia Department of Economic Development in pilot project]]></teaser>  <type>news</type>  <sentence><![CDATA[Department of Defense grant enables collaboration with Spelman College, Technical College System of Georgia, and the Georgia Department of Economic Development in pilot project]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2021-12-16T00:00:00-05:00</dateline>  <iso_dateline>2021-12-16T00:00:00-05:00</iso_dateline>  <gmt_dateline>2021-12-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[peralte.paul@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Writer and media relations contact:</p><p><strong>P&eacute;ralte C. Paul</strong><br /><a href="mailto:peralte.paul@comm.gatech.edu"><strong>peralte.paul@comm.gatech.edu</strong></a><br /><strong>404.316.1210</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>653740</item>          <item>653741</item>      </media>  <hg_media>          <item>          <nid>653740</nid>          <type>image</type>          <title><![CDATA[Stebner AMPF Lab Session]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Stebner Group 2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Stebner%20Group%202.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Stebner%20Group%202.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Stebner%2520Group%25202.jpg?itok=feUO5BST]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Aaron Stebner leads lab class at Advanced Manufacturing Pilot Facility at Georgia Tech ]]></image_alt>                    <created>1639665415</created>          <gmt_created>2021-12-16 14:36:55</gmt_created>          <changed>1639665415</changed>          <gmt_changed>2021-12-16 14:36:55</gmt_changed>      </item>          <item>          <nid>653741</nid>          <type>image</type>          <title><![CDATA[Jerry Volcy - Spelman Innovation Lab]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Volcy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Volcy_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Volcy_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Volcy_0.jpg?itok=oK3P6nCF]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1639666006</created>          <gmt_created>2021-12-16 14:46:46</gmt_created>          <changed>1639666031</changed>          <gmt_changed>2021-12-16 14:47:11</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="215"><![CDATA[manufacturing]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="189095"><![CDATA[Aaron Stebner]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39461"><![CDATA[Manufacturing, Trade, and Logistics]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="653544">  <title><![CDATA[TRAFFIC: Transversal Radio Frequency Filter Integrated Circuit]]></title>  <uid>35832</uid>  <body><![CDATA[<div><div><div><div><div><div><p>Researchers have developed a new general-purpose, high-performance monolithic microwave integrated circuit (MMIC) for the direct filtering and processing of radio frequency (RF) signals in the microwave and millimeter-wave spectrum. The IC is designed to meet the need for high-frequency, wideband analog electronics for specialized applications with small form factors and challenging weight and power budgets.</p><p>The device, known as Transversal Radio Frequency Filter Integrated Circuit (TRAFFIC), has demonstrated a fully-reconfigurable 10-to-1 analog finite impulse response (FIR) filter for tunable filtering across a wide band of frequencies from 2 to 20 gigahertz. TRAFFIC was implemented in silicon-germanium (SiGe) technology, a platform designed for high-frequency performance of mixed-signal and analog IC designs.</p><h2>Reducing Size, Weight and Power Needs</h2><p>TRAFFIC is intended to reduce the size, weight and power (SWaP) requirements of RF front-ends while providing broadband, instantaneous reconfigurability and multi-function RF capability. The GTRI team has already demonstrated TRAFFIC as a front-end reconfigurable filter and new efforts are on-going to leverage this technology as an analog signal conditioner within a self-interference cancelling system.</p><p>&ldquo;TRAFFIC is really about putting more of the functionality closer to the aperture,&rdquo; said Doug Denison, director of the Advanced Concepts Laboratory at the Georgia Tech Research Institute (GTRI). &ldquo;Doing that potentially reduces size, weight, power and also cost, while lowering latency through the system and relieving some of the burden on digital components.&rdquo;</p><p>Filtering out unwanted high-power or out-of-band signals before they enter digital signal processing can improve a system&rsquo;s ability to process low-power signals of interest by preserving the dynamic range of the incoming signal. The FIR filtering also allows pre-compensation for distortion that occurs when amplifiers operate in saturation &ndash; a condition that can make them more power efficient.</p><p>TRAFFIC was designed to be highly reconfigurable, allowing it to provide the flexibility that in the past has been delivered by power-hungry digital blocks that were needed to convert analog signals to digital for processing, explained Nelson Lourenco, a GTRI senior research engineer who is the program&rsquo;s project director.</p><p>&ldquo;High-speed digitization blocks targeting microwave frequencies are expensive and consume a lot of power,&rdquo; said Lourenco. &ldquo;In RF, we can perform processing similar to what can be done in field programmable gate arrays (FPGA), with the idea being that since this is a small integrated circuit, we can put it very close to antennas and integrate it by developing form factor solutions that are very small.&rdquo;</p><div><div><div><div><div><div><h2>Moving Processing Closer to the Aperture</h2><p>Beyond the heavy power needs, conversion of analog signals to digital introduces latency into the system, and imposes speed and bandwidth limits that require signals to be sampled instead of fully processed. TRAFFIC&rsquo;s wideband capabilities allow aperture data to be directly analyzed without sampling.</p><p>&ldquo;Anything we can shift from digital to analog will make the system more capable,&rdquo; said Lourenco. &ldquo;We can configure it more quickly, reduce latency and integrate the electronics right at the antenna. Some of the sensitive processing that we need to do can be done directly in RF, which opens up a lot more capability.&rdquo;</p><div><div><div><div><div><div><h2>Using the Benefits of Silicon Germanium</h2><p>The GTRI researchers worked with <strong><a href="https://www.ece.gatech.edu/faculty-staff-directory/john-d-cressler" target="_blank">John Cressler</a></strong>, a Regents Professor in the Georgia Tech School of Electrical and Computer Engineering, to develop the TRAFFIC architecture in <strong><a href="https://en.wikipedia.org/wiki/Silicon%E2%80%93germanium" target="_blank">silicon-germanium</a></strong> (SiGe), a semiconductor material used for heterojunction bipolar devices designed to provide high-frequency performance in mixed-signal circuit and analog circuit ICs.</p><p>Cressler&rsquo;s team brought a number of novel circuit designs to the project, and demonstrated that the fully integrated filter IC could meet the demanding performance specifications. The IC was based on a 250 GHz, 130 nm SiGe BiCMOS (bipolar + CMOS) platform from semiconductor manufacturing and design company GlobalFoundries.</p><p>&ldquo;SiGe technology is a commercially-available, low-cost, high-performance, fully silicon compatible IC technology that is ideal for realizing performance constrained ICs such as this active filter,&rdquo; Cressler said. &ldquo;The SiGe technology is able to meet the demands of the highly integrated, compact active filter that is the showpiece of TRAFFIC&rsquo;s FIR processor.&rdquo;</p><p>To support system-level demonstrations, GTRI researchers also developed testbeds for integrating multiple TRAFFIC blocks and showcase its modular nature. Georgia Tech is seeking patent protection for the IC architecture, and presented details of the work December 5-8 at the 2021 IEEE BiCMOS and Compound Semiconductor Integrated Circuits and Technology Symposium.</p><h2>Flexibility to Support Niche Applications</h2><p>Though implemented first in SiGe, TRAFFIC could be fabricated in gallium arsenide, gallium nitride, indium phosphide or other platforms. &ldquo;There are certain niche applications where silicon isn&rsquo;t going to be the best, and TRAFFIC will support those by being technology agnostic,&rdquo; Lourenco said.</p><p>The programmability of TRAFFIC creates a strong advantage in the kinds of applications GTRI develops for its sponsors, Denison said.</p><p>&ldquo;As the signal environment changes, we can dynamically adapt to that environment with our analog hardware at the front of the system,&rdquo; he said. &ldquo;Our filters are entirely programmable so we can dynamically tune its performance, essentially over microsecond time scales.&rdquo;</p><p>Development of the TRAFFIC application has helped give GTRI a new capability for in-house circuit design, which is important for meeting the requirements of the specialized applications it develops.</p><p>&ldquo;To get the bandwidth and the kind of size, weight and performance that we require, we need to have an IC design capability,&rdquo; Denison said. &ldquo;Our interest in this was for high-frequency, wideband analog electronics.&rdquo;</p><p>In addition to those already mentioned, the research team also included Chris Coen, Nancy Saldanha, John Morse, Chris Howard, Billbang Sayasean, Jeramy Marsh, Matthew Tate, Javier Sarabia, Phillip Moore, Peter McMenamin, Paul Jo, Craig Swanson, Michael Grady, and Bill Hunter, all from GTRI. Adilson Cardoso, formerly from GTRI, was also a key contributor to the TRAFFIC program.</p><p>&nbsp;</p><p>Writer: <a href="mailto: john.toon@gtri.gatech.edu" target="_blank">John Toon</a><br />GTRI Communications<br />Georgia Tech Research Institute<br />Atlanta, Georgia USA</p><p>&nbsp;</p><p>&nbsp;</p><p>*****</p><p>The Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees supporting eight laboratories in over 20 locations around the country and performing more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry.</p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1639064294</created>  <gmt_created>2021-12-09 15:38:14</gmt_created>  <changed>1639064514</changed>  <gmt_changed>2021-12-09 15:41:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a new silicon-germanium integrated circuit enabling direct throughput RF signal processing.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a new silicon-germanium integrated circuit enabling direct throughput RF signal processing.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2021-12-09T00:00:00-05:00</dateline>  <iso_dateline>2021-12-09T00:00:00-05:00</iso_dateline>  <gmt_dateline>2021-12-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>653541</item>          <item>653542</item>          <item>653540</item>      </media>  <hg_media>          <item>          <nid>653541</nid>          <type>image</type>          <title><![CDATA[Researchers with the TRAFFIC Integrated Circuit]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2021_1105_ACL_TRAFFIC_021-R.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2021_1105_ACL_TRAFFIC_021-R.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2021_1105_ACL_TRAFFIC_021-R.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2021_1105_ACL_TRAFFIC_021-R.jpg?itok=q9Dcy9zT]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1639063532</created>          <gmt_created>2021-12-09 15:25:32</gmt_created>          <changed>1639063532</changed>          <gmt_changed>2021-12-09 15:25:32</gmt_changed>      </item>          <item>          <nid>653542</nid>          <type>image</type>          <title><![CDATA[TRAFFIC: A New Integrated Circuit Design]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[2021_0930_ACL_Hardware_002-R_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/2021_0930_ACL_Hardware_002-R_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/2021_0930_ACL_Hardware_002-R_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/2021_0930_ACL_Hardware_002-R_0.jpg?itok=4TIgrK1H]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1639063632</created>          <gmt_created>2021-12-09 15:27:12</gmt_created>          <changed>1639063632</changed>          <gmt_changed>2021-12-09 15:27:12</gmt_changed>      </item>          <item>          <nid>653540</nid>          <type>image</type>          <title><![CDATA[Transversal Radio Frequency Filter Integrated Circuit ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Traffic1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Traffic1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Traffic1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Traffic1.jpg?itok=uY1gt3f_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1639063382</created>          <gmt_created>2021-12-09 15:23:02</gmt_created>          <changed>1639063809</changed>          <gmt_changed>2021-12-09 15:30:09</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="169432"><![CDATA[signal processing]]></keyword>          <keyword tid="170841"><![CDATA[silicon-germanium]]></keyword>          <keyword tid="1262"><![CDATA[traffic]]></keyword>          <keyword tid="189497"><![CDATA[radio frequency]]></keyword>          <keyword tid="7639"><![CDATA[integrated circuit]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="189498"><![CDATA[Advanced Concepts Laboratory]]></keyword>      </keywords>  <core_research_areas>          <term tid="39471"><![CDATA[Materials]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="651843">  <title><![CDATA[Developing 5G Solutions for the State of Georgia, Nation ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>Researchers at the Georgia Tech Research Institute (GTRI) are exploring ways to use 5G &ndash; a mobile technology that promises download speeds many times faster than current 4G LTE wireless networks and significantly lower latency times &ndash; to advance national security and ensure rural parts of Georgia have equitable access to high-speed broadband services, among other applications.</p><h2>On the Ground&nbsp;</h2><p>In terms of sponsored projects, GTRI has established 5G prototypes at <a href="https://www.hill.af.mil/">Hill Air Force Base</a> in northern Utah, with funding awarded by Advanced Technology International (ATI). The project is specifically looking at using dynamic spectrum sharing, or DSS, to allow 5G networks and military radars to operate on the same spectrum band.</p><p>&quot;Our role at Hill AFB is to look at how a 5G network can share the same spectrum as radar systems,&quot; said Grant Lohsen, a GTRI senior research engineer who is leading the project. &quot;In other words, we&#39;re exploring how to use dynamic spectrum sharing to minimize interference introduced to a radar system from increased activity on an in-band 5G network.&quot;</p><p>5G technology currently operates on three spectrum bands: high-band, mid-band, and low-band. High-band spectrum, also known as millimeter-wave spectrum, is seen as the most desirable of the three spectrum bands since it can carry massive amounts of data at high speeds. But its shorter wavelengths means it has trouble traveling long distances and penetrating certain surfaces. By comparison, low-band spectrum can travel long distances and penetrate walls but has less bandwidth.</p><p>GTRI is also researching the concept of network slicing for tactical applications, which allows multiple independent virtual networks to operate on one logical network.&nbsp;Unlike earlier cellular technologies, network slicing allows quality of service configuration (including throughput, latency and security) based on the application requirements&nbsp;throughout the 5G network down to the physical layer. The 5G standard enables flexible mapping between the individual slices and physical layer resources (such as&nbsp;spectrum, time, and antenna beams), allowing for research, design and integration of commercial 5G network technologies into a secure tactical framework using open source tools.&nbsp;&nbsp;</p><p>In a hypothetical military setting, network slicing could enable soldiers to exchange vital information while reserving higher-quality bandwidth to stream video back to a command headquarters &ndash; all while ensuring the data remains secure. &nbsp;</p><p>&quot;With network slicing, different classes of traffic &ndash; whether it&#39;s higher throughput or lower latency, classified or unclassified, etc., &ndash; can be assigned to different portions of the 5G network,&quot; said Tanah Barchichat, a GTRI senior research engineer who is leading the network slicing research. &quot;It&rsquo;s a big feature we feel that the defense community can take advantage of.&quot;</p><h2>Homegrown&nbsp;</h2><p>GTRI is also examining ways to cost-effectively bring high-speed broadband networks to rural parts of Georgia, many of which have struggled to keep up with network demand as the pandemic accelerates the shift to remote work and distance learning.&nbsp;&nbsp;</p><p>Specifically, Bill Lawton, a GTRI principal research engineer studying 5G use case applicability to help rural Georgians, said GTRI is exploring the feasibility of bringing 5G-powered fixed wireless access service to homes in rural Georgia.</p><p>&quot;A home owner could just have a router-like device and place it in a window facing wherever the nearest cell tower is, and have high-speed broadband in their home,&quot; Lawton said. &quot;That&#39;s an area where 5G can help increase broadband penetration to rural areas at much lower installation costs than traditional broadband services.&quot;</p><p>There are also opportunities to bring 5G to Georgia&#39;s agricultural communities. 5G stands to transform things like crop management, where farms could use the technology to monitor crops, allowing fertilizer or pesticide treatment of specific portions of fields instead of applying the same treatment to an entire field. Farms could also use 5G to equip farm machinery and equipment with higher compute power and more advanced data collection capabilities.</p><p><strong>&quot;</strong>The agriculture industry is one of many areas in Georgia that can greatly benefit from pervasive 5G technologies,&quot; Lawton said.</p><h2>Problem Solving&nbsp;&nbsp;<strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2><p>Closer to home, right at GTRI, researchers have constructed a 5G laboratory where they are conducting over-the-air testing of 5G networks and utilizing open source 5G software to further their research.</p><p>GTRI is working to provide a standards-based, open source, 5G cellular system to the government. The goals of the project are to break vendor lock-in, provide a baseline from which mission-specific 5G cellular enhancements can be created, and evolve the system over time as technology advances.</p><p>&ldquo;This will allow for implementation of the 3GPP features that may not be commercially viable but are of great interest to government customers,&quot; Lohsen said.</p><p>3GPP, or the 3rd Generation Partnership Project, is an organization consisting of seven telecommunications standards organizations that develop protocols for various cellular telecommunications technologies, including 5G.&nbsp;&nbsp;&nbsp;&nbsp;</p><p>Lawton said the team is applying lessons learned from early 5G rollouts in the commercial space to prepare the technology for widespread use in defense settings.&nbsp;&nbsp;&nbsp;</p><p>A major selling point for 5G in the commercial space has been its ability to enable a new era of the internet of things &mdash; a network of interconnected electronics, vehicles and home appliances that interact and exchange data. However, many of these applications have been seen as at least a few years away, as they rely on future releases and updates to the 5G specifications that have yet to be finalized.</p><p>&quot;We&#39;re connecting current models of smartphones to our 5G network and analyzing how these 5G networks really perform versus what&#39;s advertised, and how we can best set up and orient these 5G networks to be able to satisfy the requirements of deploying the systems in a tactical environment,&quot; Lawton said.</p><p>&nbsp;</p><p>&nbsp;</p><p>*****</p><p>Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees supporting eight laboratories in over 20 locations around the country and performs more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry. Learn more at <a href="https://www.gtri.gatech.edu/" target="_blank">https://www.gtri.gatech.edu/</a> and follow us on <a href="http://www.linkedin.com/company/3557?trk=EML_cp-admin" target="_blank">LinkedIn</a>, <a href="http://twitter.com/GTRI" target="_blank">Twitter</a>, <a href="http://www.facebook.com/GTRIFan" target="_blank">Facebook</a>, and <a href="https://www.instagram.com/georgiatechresearchinstitute/" target="_blank">Instagram</a>.&nbsp;</p><p><em>Writer: Anna Akins&nbsp;</em></p><p><em>Photographer: Christopher Moore&nbsp;</em></p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1634740706</created>  <gmt_created>2021-10-20 14:38:26</gmt_created>  <changed>1634740706</changed>  <gmt_changed>2021-10-20 14:38:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers at the Georgia Tech Research Institute (GTRI) are exploring ways to use 5G mobile technology to advance national security and ensure rural parts of Georgia have equitable access to high-speed broadband services, among other applications.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers at the Georgia Tech Research Institute (GTRI) are exploring ways to use 5G mobile technology to advance national security and ensure rural parts of Georgia have equitable access to high-speed broadband services, among other applications.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2021-10-20T00:00:00-04:00</dateline>  <iso_dateline>2021-10-20T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-10-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>651838</item>          <item>651837</item>      </media>  <hg_media>          <item>          <nid>651838</nid>          <type>image</type>          <title><![CDATA[GTRI senior research engineer Tanah Barchichat]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Tanah Barchichat.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Tanah%20Barchichat.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Tanah%20Barchichat.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Tanah%2520Barchichat.jpg?itok=ak9YxJ6a]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1634737533</created>          <gmt_created>2021-10-20 13:45:33</gmt_created>          <changed>1634737533</changed>          <gmt_changed>2021-10-20 13:45:33</gmt_changed>      </item>          <item>          <nid>651837</nid>          <type>image</type>          <title><![CDATA[GTRI principal research engineer Bill Lawton]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[BLawton1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/BLawton1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/BLawton1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/BLawton1.jpg?itok=ABuk1OWU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1634737320</created>          <gmt_created>2021-10-20 13:42:00</gmt_created>          <changed>1634737320</changed>          <gmt_changed>2021-10-20 13:42:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="171151"><![CDATA[State of Georgia]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="623"><![CDATA[Technology]]></keyword>          <keyword tid="7770"><![CDATA[cellular]]></keyword>          <keyword tid="1033"><![CDATA[Economic Impact]]></keyword>          <keyword tid="172364"><![CDATA[5G]]></keyword>          <keyword tid="14835"><![CDATA[wireless technology]]></keyword>          <keyword tid="180496"><![CDATA[5G wireless communications]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="651491">  <title><![CDATA[ Celebrating Inclusive Excellence: Mike Ruiz’s Drive to Serve Students and the Nation ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>Elbert (Mike) Ruiz has always loved to tinker. Early in his life, he wanted to be a scientist, drawn by the allure of lab coats and beakers. Mike&#39;s grandfather, a lawyer and textile engineer, slightly altered that course by not just encouraging, but telling Mike he would be an engineer, as he himself was told by his father.&nbsp;</p><p>With a knack for math and science that was developed throughout middle and high school, Mike secured a scholarship through the Department of Defense (DoD). In 1999, Mike arrived on the <a href="https://www.gatech.edu/" target="_blank">Georgia Institute of Technology&#39;s</a> (Georgia Tech) campus as a freshman in electrical engineering. Over the next five years, thanks to his scholarship program allowing him to extend his education, Mike worked diligently to receive both his bachelor&#39;s and master&#39;s in electrical engineering.</p><p>Now a principal research engineer at the Georgia Tech Research Institute (GTRI), Mike shares the story of his family motivating his career and the mentorship he offers to students.</p><h2>The Role of Family</h2><p>Ruiz&#39;s family served as his motivator and encourager. Like his father, Mike was born in Puerto Rico, but he lived across the United States throughout his childhood. Mike&#39;s father served in the United States Air Force&mdash;and his mother in the <em>Air Force</em> Civilian <em>Service</em>, taking the family to places such as New Mexico, Texas, and Florida. Mike identifies as half-Hispanic and half-Black, from his mother&#39;s Haitian heritage. In the various school systems Mike attended, he didn&#39;t always have the same support as his peers.</p><p>&quot;I felt like an outsider because [where I lived there weren&rsquo;t] huge minority, Hispanic communities,&quot; said Mike. &quot;I had to overachieve to get the same respect and interest.&quot;</p><p>Because of the inequity in his schooling, Mike taught himself never to say &quot;no&quot; when asked to do anything, because he didn&#39;t want to lose any chance at future opportunities. Rather than a specific teacher or mentor, it was Mike&#39;s mother who pushed him to do better and achieve new heights. The support of his family and Mike&#39;s intense work ethic led to several scholarship offers as he approached college.</p><h2>Civil Service at the Department of Defense</h2><p>Mike&#39;s family possesses a strong desire and commitment to serve their country. Mike&#39;s grandfather and father both served in the United States Air Force. Throughout high school, Mike participated in Junior Reserve Officers&#39; Training Corps (JROTC), and he planned to continue the tradition of service. By late high school, Mike&rsquo;s Senior Aerospace Science Instructor (SASI) spoke with him about an opportunity to attend college for free and then serve with the Air Force. Then, an unsolicited offer from the U.S. Department of Defense (DoD) altered the path of Mike&#39;s life.</p><p>The DoD scholarship, which would later become the Stokes Educational Scholarship Program, allowed Mike to attend a college of his choice to pursue a STEM degree. While pursuing his degrees at Georgia Tech, Mike worked as a rotational intern at the DoD, focusing on antenna and radio frequency (RF) design and testing. As his time at Georgia Tech was coming to a close, Mike prepared for his commitment period with the DoD, where he would end up staying for 11 more years. Knowing he had a job lined up following graduation alleviated a lot of Mike&#39;s stress and allowed him to focus on finishing up his master&#39;s, which he did in one year instead of the typical two.</p><p>Mike thrived at the DoD, and it allowed him to continue his family&#39;s commitment to service. &quot;I was able to serve my country through civil service, next to the world&#39;s experts on a daily basis,&quot; said Mike.</p><h2>Bringing Technical and Leadership Expertise to GTRI</h2><p>While working at the DoD, Mike blazed a telecommuting trail, allowing him to work on unclassified research from his home and traveling to the office when necessary. Based in Atlanta, Mike worked with GTRI from the sponsor side. On one visit, GTRI representatives presented interesting and exciting research happening at GTRI, and Mike was highly intrigued.</p><p>When it came time to start a family, Mike and his wife wanted to fully lay down roots in Atlanta. Already familiar with GTRI and its research, Mike felt he could bring a useful perspective and skillset to the organization. In 2015, Mike joined GTRI as an embedded systems security researcher.</p><p>&quot;My undergraduate focus [was] on antennas, mixed-signal, and integrated circuit design. [While working for the DoD] I looked at the security of software, network security, and media forensics,&quot; said Mike. &quot;I was deployed to an active war zone in 2006 &ndash; research for the warfighter. All that came to a head when I came to GTRI.&quot;</p><p>In 2018, Mike became the associate chief of GTRI&#39;s Trusted Microelectronics Program Office (TMPO), which operates in the <a href="https://www.gtri.gatech.edu/laboratories/cybersecurity-information-protection-and-hardware-evaluation-research" target="_blank">Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory</a>. TMPO researches applications, tools, architectures, and materials to evaluate microelectronic devices&#39; security, trust, and reliability and the critical systems that rely upon them. In this leadership role, Mike can help steer the direction of the new office, mentor younger researchers, and conduct cutting-edge research.</p><p>&quot;I want to have more influence and the ability to affect the largest number of individuals who might be early in their career,&quot; said Mike. &quot;I plan to bring up as many individuals [as I can], and I&#39;ll take up any opportunities to do so.&quot;&nbsp;</p><h2>Supporting the Next Generation</h2><p>Mike has taken every opportunity to mentor younger researchers and students. Soon after he started at GTRI, Mike began leading a <a href="https://www.vip.gatech.edu/" target="_blank">Vertically Integrated Project</a> (VIP) at Georgia Tech with GTRI Principal Research Engineer Lee Lerner, Ph.D.</p><p>Previously, they organized a class project called <a href="https://www.vip.gatech.edu/teams/vpz">Tech Cities</a>, which aimed to research and develop a smart city infrastructure for the Atlanta area with a focus on configurable hardware as a computational platform. Soon, they are launching a new effort to design and build a custom, secure mobile voting machine, for the purposes of bringing the voting booth to individuals who might not be able to themselves come out to a polling location.</p><p>&quot;VIP is something we didn&#39;t have when I was a student,&quot; said Ruiz. &quot;The project provides an opportunity to establish multiyear engineering growth, where students can watch a product flourish.&quot;</p><p>Mike&#39;s work with students doesn&#39;t stop there. He helps graduate research assistants (GRAs) and co-op students when they come to work at GTRI while finishing their degrees. <a href="https://gtri.gatech.edu/newsroom/gtri-partners-national-gem-consortium-recruit-diverse-talent" target="_blank">GTRI partners with the National GEM Consortium</a>&mdash; a network of leading corporations, government laboratories, elite universities, and elite research institutions that empowers qualified students from underrepresented communities to pursue a graduate degree in STEM fields. During the summer, GEM fellows participate in paid internships at GTRI, which Mike assists with. Mike has also mentored local high school students through GTRI&#39;s <a href="https://gtri.gatech.edu/stem/high-school-summer-internship" target="_blank">High School Summer Internship Program</a>.</p><p>&quot;I&#39;m passionate about mentoring students,&quot; said Mike. &quot;I want to provide students with a tangible way to work on actual engineering projects.&quot;</p><p>Mike has worked closely with <a href="https://pe.gatech.edu/">Georgia Tech Professional Education</a> to contribute to the development of two distinct courses (Digital Forensic Techniques for Weapons Systems and Embedded Security Tools and Techniques) and provided material contributions to at least four additional courses.</p><p>While Mike keeps busy with his research and mentorship at GTRI, he holds firmly onto a family-first mentality.</p><p>&quot;I want to be a good role model for my children like my parents [are] for me,&quot; said Mike. &quot;You can never tell what will happen, and I hope that provides tangible results for my family so that when my kids grow up, they will continue this cycle of striving for excellence.&quot;</p><p>&nbsp;</p><p>****</p><p>Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,700 employees supporting eight laboratories in over 20 locations around the country and performs more than $600 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry. Learn more at <a href="https://www.gtri.gatech.edu/" target="_blank">https://www.gtri.gatech.edu/</a> and follow us on <a href="http://www.linkedin.com/company/3557?trk=EML_cp-admin" target="_blank">LinkedIn</a>, <a href="http://twitter.com/GTRI" target="_blank">Twitter</a>, <a href="http://www.facebook.com/GTRIFan" target="_blank">Facebook</a>, and <a href="https://www.instagram.com/georgiatechresearchinstitute/" target="_blank">Instagram</a>.&nbsp;</p><p><em>Writer: Katrina Heitz</em></p><p><em>Photographer: Sean McNeil</em></p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1633554808</created>  <gmt_created>2021-10-06 21:13:28</gmt_created>  <changed>1633554808</changed>  <gmt_changed>2021-10-06 21:13:28</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Now a principal research engineer at the Georgia Tech Research Institute (GTRI), Mike Ruiz shares the story of his family motivating his career and the mentorship he offers to students.]]></teaser>  <type>news</type>  <sentence><![CDATA[Now a principal research engineer at the Georgia Tech Research Institute (GTRI), Mike Ruiz shares the story of his family motivating his career and the mentorship he offers to students.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2021-10-06T00:00:00-04:00</dateline>  <iso_dateline>2021-10-06T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-10-06 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>651489</item>          <item>651490</item>      </media>  <hg_media>          <item>          <nid>651489</nid>          <type>image</type>          <title><![CDATA[Celebrating Inclusive Excellence with Mike Ruiz]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Mike_Ruiz_10.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Mike_Ruiz_10.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Mike_Ruiz_10.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Mike_Ruiz_10.jpg?itok=MFH8gWLx]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1633553851</created>          <gmt_created>2021-10-06 20:57:31</gmt_created>          <changed>1633553851</changed>          <gmt_changed>2021-10-06 20:57:31</gmt_changed>      </item>          <item>          <nid>651490</nid>          <type>image</type>          <title><![CDATA[Celebrating Inclusive Excellence with GTRI Researcher Mike Ruiz]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[091621 Mike Ruiz_08.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/091621%20Mike%20Ruiz_08.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/091621%20Mike%20Ruiz_08.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/091621%2520Mike%2520Ruiz_08.jpg?itok=7uPIvJYm]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1633554014</created>          <gmt_created>2021-10-06 21:00:14</gmt_created>          <changed>1633554014</changed>          <gmt_changed>2021-10-06 21:00:14</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="516"><![CDATA[engineering]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="189002"><![CDATA[GEM Consortium]]></keyword>          <keyword tid="76791"><![CDATA[GTPE]]></keyword>          <keyword tid="189003"><![CDATA[high school internship]]></keyword>          <keyword tid="176094"><![CDATA[CIPHER]]></keyword>          <keyword tid="14601"><![CDATA[mentorship]]></keyword>          <keyword tid="41081"><![CDATA[inclusive excellence]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="651101">  <title><![CDATA[Researchers Discover Vulnerability in Widely-Used Method for Securing Phone Data]]></title>  <uid>35899</uid>  <body><![CDATA[<p>Georgia Tech Researchers have now shown that one of the very measures meant to keep data secure on a low-end phone can enable attackers to steal it.&nbsp;</p><p>Their paper, presented on September 10 at the <a href="https://www.ieee-security.org/TC/EuroSP2021/index.html">6th IEEE European Symposium on Security and Privacy</a>, demonstrates successful attacks on two different types of low-end Android phones, a ZTE Zfive and an Alcatel Ideal. In accordance with standard practice, the researchers reported their findings to software developers before releasing their results so that the problem can be fixed.</p><p>The attack relies on placing a radio sensor within a few centimeters of a device, close enough to detect the weak radio waves that are inadvertently emitted by a phone&rsquo;s processor. By witnessing a single secure web transaction transmitted in these signals, an attacker can figure out a user&rsquo;s secret key, a form of numerical password that is used to encrypt their data.</p><p>&ldquo;It demonstrates that a really powerful attack, one that can actually steal the key, can be done under realistic conditions,&rdquo; said Milos Prvulovic, professor of Computer Science at Georgia Tech and coauthor of the study. &ldquo;How many times have you put your phone down on a desk at the airport and not checked what&#39;s under the desk?&rdquo;</p><p>Fortunately, the researchers found a relatively straightforward fix. Implementing this fix is currently in progress, and will be important. If researchers can figure out how to make the attack work on high-end phones, then the same vulnerability will occur on billions of the most widely-used modern devices.&nbsp;</p><p><strong>Hacking a Phone from the Side</strong></p><p>Secret keys or encryption keys are often used for securing user data. Once the attacker has access to a user&rsquo;s encryption keys, they can forge their &ldquo;digital signature&rdquo; and gain access to banking data, for example. Because the newly discovered attack should work on a wide variety of phones in everyday use, it is expected to require prompt amendment to the relevant security standards, RFC 7748.&nbsp;</p><p>The attack targets a standard encryption process employed in a wide range of online activities, such as logging into a virtual private network (VPN), creating a secure web connection with a bank, or e-signing a digital document. During this process, two endpoints on a network, such as two phones, must exchange a series of messages to verify each other&rsquo;s identity. If they cannot verify that they are who they say they are, then they know not to send private data.</p><p>Proving one&rsquo;s identity amounts to carrying out a certain kind of encryption algorithm. This algorithm involves a series of operations on a secret key called a &ldquo;nonce,&quot; which can be represented as a binary number, a sequence of ones and zeroes or &quot;bits.&quot; For each operation that a phone&rsquo;s processor carries out, it emits a weak radio signal, thousands of times weaker than the signal of a Wi-Fi transmitter. These signals are called &ldquo;side-channel&rdquo; emissions since they do not come from the primary channels that the phone uses to communicate.</p><p>Years ago, researchers realized that these side-channel emissions can leak the value of the nonce. For example, an encryption algorithm might require additional processing steps when a bit of the nonce is a one, making the processor emit a longer lasting signal for those bits. By tracking the pattern of longer and shorter emissions that come from the phone while it is processing the nonce, an attacker can reconstruct the value of each of its bits. From there, they can break a user&rsquo;s encryption.&nbsp;</p><p>Other researchers invented a solution for this problem known as a &ldquo;constant-time&rdquo; algorithm. This algorithm ensures that a processor carries out the same sequence of operations for each bit. The radio emissions are therefore indistinguishable for each bit and the nonce cannot be reconstructed. This algorithm was codified in encryption standards like RFC 7748 and widely adopted.&nbsp;</p><p><strong>Breaking the Constant-Time Algorithm</strong></p><p>In the new work, the researchers discovered a problem with the constant-time algorithm. One particular operation that is carried out for each bit, called a &ldquo;conditional swap,&rdquo; has a tell-tale trait. When the operation is performed on a bit with the value of one, the processor emits a slightly stronger radio signal. The researchers realized that if an attacker could listen in on the emissions during this operation, each time it occurs, they could determine the nonce.&nbsp;</p><p>The hard part was to figure out whether they could focus in on the specific radio signature of the conditional swap, buried within a sequence of many other emissions. Also, because of the high processing speed of modern phones, the radio signature of the conditional swap only lasts for a brief duration. But, it turns out, it is the constant-time algorithm &mdash; meant to be a countermeasure to side-channel attacks &mdash; which allows the attack to work in the first place.&nbsp;</p><p>The key for the researchers was to carefully observe a phone&#39;s emissions. Because of the constant-time algorithm, these emissions are extremely regular. Each time the phone processes a bit, the same general pattern of emissions takes place. The researchers could therefore automate the process of picking out the tiny piece of emissions corresponding to the conditional swap, like learning to spot a small logo on a fast-moving train car by watching enough train cars passing by. From there, the researchers could measure the strength of the emissions to determine whether each bit was a zero or one, and thereby reconstruct the entire nonce.</p><p>The attack works so effectively that researchers found they only needed to listen in on a single secure transaction to steal a phone&rsquo;s secret key.</p><p>&ldquo;As long as somebody can put a probe or antenna close enough,&rdquo; said Prvulovic, &ldquo;We can have your key now.&rdquo;</p><p>To fix the issue, the researchers modified the constant-time algorithm so that the signal corresponding to the conditional swap has the same strength regardless of the value of the bit. After developers implement this fix into cryptographic libraries like OpenSSL, the constant-time algorithm should be secure once again.</p><p><strong>References:</strong></p><p>Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. Monjur Alam, Baki Yilmaz and Frank Werner (Georgia Tech); Niels Samwel (Radboud University); Alenka Zajic (Georgia tech); Daniel Genkin (University of Michigan); Yuval Yarom (University of Adelaide and Data61); Milos Prvulovic (Georgia Tech). 6th IEEE European Symposium on Security and Privacy, September 6-10, 2021.</p><p><strong>About Georgia Tech</strong></p><p>The Georgia Institute of Technology, or Georgia Tech, is a top 10 public research university developing leaders who advance technology and improve the human condition. The Institute offers business, computing, design, engineering, liberal arts, and sciences degrees. Its nearly 40,000 students representing 50 states and 149 countries, study at the main campus in Atlanta, at campuses in France and China, and through distance and online learning. As a leading technological university, Georgia Tech is an engine of economic development for Georgia, the Southeast, and the nation, conducting more than $1 billion in research annually for government, industry, and society.</p>]]></body>  <author>Mordechai Rorvig</author>  <status>1</status>  <created>1632513059</created>  <gmt_created>2021-09-24 19:50:59</gmt_created>  <changed>1632517592</changed>  <gmt_changed>2021-09-24 21:06:32</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[New vulnerability enables attackers to steal secure data from low-end phones.]]></teaser>  <type>news</type>  <sentence><![CDATA[New vulnerability enables attackers to steal secure data from low-end phones.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2021-09-24T00:00:00-04:00</dateline>  <iso_dateline>2021-09-24T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-09-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[mrorvig@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Mordechai Rorvig<br />Senior Science Writer<br />Georgia Institute of Technology</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>651102</item>      </media>  <hg_media>          <item>          <nid>651102</nid>          <type>image</type>          <title><![CDATA[Prvulovic Oscilloscope]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Prvulovic Oscilloscope.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Prvulovic%20Oscilloscope.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Prvulovic%20Oscilloscope.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Prvulovic%2520Oscilloscope.jpg?itok=Fh50Mph7]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1632516027</created>          <gmt_created>2021-09-24 20:40:27</gmt_created>          <changed>1632516027</changed>          <gmt_changed>2021-09-24 20:40:27</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="650101">  <title><![CDATA[Georgia Tech Study Seeks to Bring More Diverse Voices into Computing Ethics Education]]></title>  <uid>34600</uid>  <body><![CDATA[<p><strong>Georgia Tech Study Seeks to Bring More Diverse Voices into Computing Ethics Education</strong></p><p>Jason Borenstein of the <a href="https://spp.gatech.edu/">School of Public Policy</a>, Ellen Zegura of the <a href="https://scs.gatech.edu/">School of Computer Science</a>, and Charles Isbell, dean of the <a href="https://cc.gatech.edu/">College of Computing</a>, will lead a three-year, National Science Foundation-funded study seeking to &ldquo;better understand and amplify the diverse range of voices that may have been absent during the development of a traditional computing ethics curriculum.&rdquo;</p><p>Borenstein is the project&rsquo;s principal investigator. &ldquo;The main goal of this grant is to enable groups historically underrepresented in computing to have more of a direct say in what&rsquo;s offered in the computing ethics curriculum,&rdquo; said <a href="https://iac.gatech.edu/people/person/jason-borenstein">Borenstein</a>, who teaches ethics in the <a href="https://iac.gatech.edu/">Ivan Allen College of Liberal Arts</a> and is the director of graduate research ethics programs for Georgia Tech.</p><p>Black, Hispanic, and Indigenous individuals represent just over 15% of bachelor&rsquo;s degrees awarded in computer science in the United States and fewer than 4% of doctoral degrees, according to the most recent <a href="https://cra.org/wp-content/uploads/2020/05/2019-Taulbee-Survey.pdf">CRA Taulbee study</a>.</p><p>&ldquo;As computing expands to touch everyone&rsquo;s lives, it becomes more and more important to have people from a diverse set of backgrounds doing that work,&rdquo; said Isbell, a co-principal investigator on the study. &ldquo;What we do in the classroom and in our careers must be responsible to all of the different groups affected by our work. I am looking forward to this project and eager to see what impact we can make.&rdquo;</p><p>By learning more about how changes to the curriculum might change students&rsquo; perceptions of ethics in computing, the hope is the team will be able to develop recommendations for changes instructors could implement to make the curriculum more diverse, inclusive, and attentive to thorny ethical issues that many students may never personally experience, Zegura said. Such efforts are foundational to Georgia Tech&rsquo;s mission to educate leaders who advance technology and improve the human condition.</p><p>&ldquo;We&rsquo;re educating many future software developers. We have a chance through these students to do more to make computing responsible to all parts of society. An important piece is educating future developers to think broadly and carefully about the software they are building,&rdquo; &nbsp;said Zegura, also co-PI on the study.</p><p>Borenstein, Zegura, and Isbell hope to survey minority faculty at a number of U.S. universities about what they are teaching and what they think should be taught as part of the computing ethics curriculum. They are working with senior advisors from the faculties of Georgia State University, Morehouse College, and Florida International University and an advisory board.</p><p>A key step will be to create sample course syllabuses incorporating the views of surveyed faculty and measure to see if the proposed additions would change students&rsquo; perceptions of the computing fields and the classes they might take.</p><p>&ldquo;Our hope is that it might help with retention rates,&rdquo; Borenstein said. &ldquo;If, for instance, you talk about issues more directly related to social justice in your computing courses, is that going to resonate with different student populations and potentially make them more interested in staying in computing?&rdquo;</p><p>The project is funded by a $398,288 <a href="https://nsf.gov/awardsearch/showAward?AWD_ID=2124745">NSF grant</a> through its Ethical and Responsible Research (ER2) program.</p>]]></body>  <author>mpearson34</author>  <status>1</status>  <created>1629923953</created>  <gmt_created>2021-08-25 20:39:13</gmt_created>  <changed>1630106770</changed>  <gmt_changed>2021-08-27 23:26:10</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The researchers hope to "enable groups historically underrepresented in computing to have more of a direct say in what’s offered in the computing ethics curriculum."]]></teaser>  <type>news</type>  <sentence><![CDATA[The researchers hope to "enable groups historically underrepresented in computing to have more of a direct say in what’s offered in the computing ethics curriculum."]]></sentence>  <summary><![CDATA[<p>The researchers hope to &quot;enable groups historically underrepresented in computing to have more of a direct say in what&rsquo;s offered in the computing ethics curriculum.&quot;</p>]]></summary>  <dateline>2021-08-26T00:00:00-04:00</dateline>  <iso_dateline>2021-08-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-08-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Michael Pearson<br />michael.pearson@iac.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>650100</item>      </media>  <hg_media>          <item>          <nid>650100</nid>          <type>image</type>          <title><![CDATA[Computing Ethics Grant]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[computing ethics grant.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/computing%20ethics%20grant.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/computing%20ethics%20grant.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/computing%2520ethics%2520grant.jpg?itok=dIQ22kZ7]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[""]]></image_alt>                    <created>1629923735</created>          <gmt_created>2021-08-25 20:35:35</gmt_created>          <changed>1629982279</changed>          <gmt_changed>2021-08-26 12:51:19</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1281"><![CDATA[Ivan Allen College of Liberal Arts]]></group>          <group id="1289"><![CDATA[School of Public Policy]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="650195">  <title><![CDATA[GTRI, Georgia Tech Develop AI Psychiatry to Advance National Security ]]></title>  <uid>35832</uid>  <body><![CDATA[<p>Artificial intelligence and machine learning have taken the world by storm, controlling everything from self-driving cars and smart speakers to autonomous weapon-enabled drones. But as these technologies become more advanced, so do their potential security threats.&nbsp;&nbsp;&nbsp;</p><p>That is why Chris Roberts, a principal research engineer at the Georgia Tech Research Institute (GTRI), Brendan Saltaformaggio, an assistant professor in the <a href="https://scp.cc.gatech.edu/" target="_blank">School of Cybersecurity and Privacy</a> and the <a href="https://ece.gatech.edu/" target="_blank">School of Electrical and Computer Engineering</a> at Georgia Institute of Technology (Georgia Tech), and others have joined forces under GTRI&#39;s Graduate Student Fellowship Program to research and develop a new branch of cyber forensics called AI Psychiatry that seeks to keep data more secure in a constantly evolving technological landscape.</p><p>Saltaformaggio said his idea for AI Psychiatry stemmed from over a decade of researching and building cutting-edge cyber forensics techniques, including protecting against traditional cyberattacks to recovering digital evidence from devices at a crime scene. As AI and machine learning become more popular, Saltaformaggio said AI Psychiatry will play a key role in protecting the nation from rising security risks.&nbsp;</p><p>&quot;You almost can&#39;t go anywhere now without some involvement from machine learning and artificial intelligence,&quot; Saltaformaggio said. &quot;We knew it was only a matter of time before these things started being targeted in the real world.&quot;</p><p>Providing the example of a self-driving car, GTRI&#39;s Roberts said that if the vehicle takes a wrong turn or speeds up unexpectedly, investigators could use AI Psychiatry to determine whether the accident was due to a cyberattack or errors in training the AI system. If the accident was caused by a cyberattack, the new forensic capability could help experts patch the vulnerability without losing any of the model&#39;s existing training.</p><p>AI and machine learning models require several rounds of energy- and time-intensive training to become more adept at handling new and existing tasks.&nbsp;&nbsp;&nbsp;&nbsp;</p><p>&quot;You save all that knowledge and can just fix the little problem as opposed to, &#39;OK, now we need to go back to square one and re-look at this model, retrain this model and redeploy it to the field,&#39;&quot; Roberts said.</p><p>The need for AI Psychiatry extends well beyond self-driving cars.</p><p>In national security, military experts have been rapidly adopting next-generation technologies to speed up training and decision-making processes &ndash; from creating more advanced image classification techniques to developing autonomous weapon-enabled drones.</p><p>&quot;When there is a failure &ndash; let&#39;s say a drone crashes &ndash; you have to have these forensic techniques to be able to understand why it crashed and what was involved,&quot; Saltaformaggio explained. &quot;&#39;Was this an act of war? Was this an attack by another government? Or was this just an accident that no one saw coming?&#39;&quot;</p><p>But developing AI Psychiatry does not come without challenges. &nbsp;</p><p>Roberts noted that since much of these new forensic capabilities do not exist today, it is up to the team to forge a new path forward in the budding field.</p><p>&quot;We&rsquo;re trying to think about what&rsquo;s going to be the problem 10 years from now, 20 years from now, when machines are effectively making decisions in the battlefield,&quot; Roberts said.</p><p>That is why a cross-partnership between GTRI and Georgia Tech is so crucial.</p><p>&quot;A relationship with campus and GTRI is just so valuable; we complement each other really well,&quot; Roberts added.</p><p>Other participating members in the AI Psychiatry research project are Noah Tobin, a GTRI senior research associate, and David Oygenblik, a graduate research assistant in the School of Electrical and Computer Engineering.</p><p>Tobin said that he expects the research to have a direct impact on protecting national security as advancements in technology give way to newer security threats.&nbsp;&nbsp;</p><p>&quot;We are moving into a future where AI is going to become more and more ubiquitous,&quot; Tobin said. &quot;We really need a lot of work to understand what the vulnerabilities of that are from a security posture.&quot;</p><p>Serving national security represents the majority of GTRI&#39;s work and remains our primary growth engine. As part of GTRI&#39;s new Strategic Plan, we seek to expand GTRI&#39;s relationship with the intelligence community through enhancing our knowledge of emerging threats and expanding our national thought leadership impact through presence, participation, and partnership with our sponsors.</p><p>The GTRI Graduate Student Fellowship Program is a competitive program for Georgia Tech graduate students working in GTRI strategic research areas. Academic faculty and GTRI researchers worked together to create proposals that are closely aligned with GTRI&#39;s strategic initiatives, and graduate students are able to work on these research projects with fully-funded fellowships for five years.&nbsp;</p><p>&nbsp;</p><p><em>Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,800 employees supporting eight laboratories in over 20 locations around the country and performs more than $700 million of problem-solving research annually for government and industry. GTRI&#39;s renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry. Learn more at <a href="https://www.gtri.gatech.edu/" target="_blank">https://www.gtri.gatech.edu/</a> and follow us on <a href="http://www.linkedin.com/company/3557?trk=EML_cp-admin" target="_blank">LinkedIn</a>, <a href="http://twitter.com/GTRI" target="_blank">Twitter</a>, <a href="http://www.facebook.com/GTRIFan" target="_blank">Facebook</a>, and <a href="https://www.instagram.com/georgiatechresearchinstitute/" target="_blank">Instagram</a>.&nbsp;</em></p><p>&nbsp;</p><p><em>Writer: Anna Akins&nbsp;</em></p><p><em>Photographer: Sean McNeil</em></p><p><em>Photo Illustration: Melanie Goux&nbsp;</em></p>]]></body>  <author>Michelle Gowdy</author>  <status>1</status>  <created>1630092082</created>  <gmt_created>2021-08-27 19:21:22</gmt_created>  <changed>1630092082</changed>  <gmt_changed>2021-08-27 19:21:22</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A group of researchers at the Georgia Tech Research Institute (GTRI) and Georgia Institute of Technology have teamed up under the inaugural GTRI Graduate Student Fellowship Program to develop a revolutionary cyber forensics technique called AI Psychiatry.]]></teaser>  <type>news</type>  <sentence><![CDATA[A group of researchers at the Georgia Tech Research Institute (GTRI) and Georgia Institute of Technology have teamed up under the inaugural GTRI Graduate Student Fellowship Program to develop a revolutionary cyber forensics technique called AI Psychiatry.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2021-08-27T00:00:00-04:00</dateline>  <iso_dateline>2021-08-27T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-08-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michelle.gowdy@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>(Interim) Director of Communications</p><p>Michelle Gowdy</p><p>Michelle.Gowdy@gtri.gatech.edu</p><p>404-407-8060</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>650193</item>      </media>  <hg_media>          <item>          <nid>650193</nid>          <type>image</type>          <title><![CDATA[Georgia Tech and GTRI Researchers developing AI Psychiatry in Support of National Security]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Picture1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Picture1_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Picture1_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Picture1_1.jpg?itok=an6pjWEX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1630091533</created>          <gmt_created>2021-08-27 19:12:13</gmt_created>          <changed>1630091533</changed>          <gmt_changed>2021-08-27 19:12:13</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="166902"><![CDATA[science and technology]]></keyword>          <keyword tid="8768"><![CDATA[psychiatry]]></keyword>          <keyword tid="543"><![CDATA[National Security]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="188749"><![CDATA[AI Psychiatry]]></keyword>          <keyword tid="2435"><![CDATA[ECE]]></keyword>          <keyword tid="175303"><![CDATA[cyber forensics]]></keyword>          <keyword tid="166855"><![CDATA[School of Electrical and Computer Engineering]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="649133">  <title><![CDATA[Georgia Tech Joins the U.S. National Science Foundation to Advance AI Research and Education]]></title>  <uid>34602</uid>  <body><![CDATA[<p>For decades, the Georgia Institute of Technology has focused on advancing artificial intelligence through interdisciplinary research and education designed to produce leading-edge technologies. Over the next five years, Georgia Tech will make a substantial investment in AI that includes hiring an additional 100 researchers in the field, further solidifying its standing as a leader in the teaching and discovery of machine learning.</p><p>Today, Georgia Tech received two National Science Foundation (NSF) Artificial Intelligence Research Institutes awards, totaling $40 million. A third award for $20 million was granted to the Georgia Research Alliance (GRA), with Georgia Tech serving as one of the leading academic institutions.</p><p>&ldquo;It is essential that we bring together our best minds to ensure that AI delivers on its promise to create a more prosperous, sustainable, safe, and fair future for everyone,&rdquo; said&nbsp;&Aacute;ngel Cabrera, president of Georgia Tech.&nbsp;&ldquo;These NSF awards recognize Georgia Tech&rsquo;s vast expertise in machine learning and AI and will help us further develop our resources and amplify our impact in these crucial fields.&rdquo;</p><p>Chaouki T. Abdallah, executive vice president for Research at Georgia Tech, concurred, citing major efforts under development to help create a more robust and inclusive future of AI, both on campus and beyond.</p><p>&ldquo;We are incredibly grateful to the NSF for their investment and excited for the opportunities made possible because of this research,&rdquo; he said. &ldquo;At Tech, our mission is to advance technology and improve the human condition, catalyzing research that matters. We invested in a unified approach to interdisciplinary research aligned with industry relevance and societal impact, and these awards demonstrate a clear return on that strategy.&rdquo;</p><p>Collectively, NSF made a <a href="https://www.nsf.gov/news/news_summ.jsp?cntn_id=303176">$220 million investment in 11 new NSF-led Artificial Intelligence Research Institutes</a>.</p><p>&ldquo;I am delighted to announce the establishment of new NSF National AI Research Institutes as we look to expand into all 50 states,&rdquo; said National Science Foundation Director Sethuraman Panchanathan. &ldquo;These Institutes are hubs for academia, industry, and government to accelerate discovery and innovation in AI. Inspiring talent and ideas everywhere in this important area will lead to new capabilities that improve our lives, from medicine to entertainment to transportation and cybersecurity, and position us in the vanguard of competitiveness and prosperity.&rdquo;</p><p>Led by NSF, and in partnership with the U.S. Department of Agriculture&rsquo;s National Institute of Food and Agriculture, the U.S. Department of Homeland Security, Google, Amazon, Intel, and Accenture, the National AI Research Institutes will act as connections in a broader nationwide network to pursue transformational advances in a range of economic sectors, and science and engineering fields &mdash; from food system security to next-generation edge networks. In addition to Georgia Tech and GRA, the University of California San Diego, Duke University, Iowa State University, North Carolina State University, The Ohio State University, and University of Washington are the lead universities included in the 11 AI Institutes.</p><p><strong>The AI Institutes at Georgia Tech </strong></p><p>The three newly established Institutes will address societal challenges, including home care for aging adults; energy, logistics, and supply chains; sustainability; the widening gap in job opportunities; and changing needs in workforce development.</p><p><a href="https://www.cc.gatech.edu/news/649114/new-ai-institute-builds-tech-support-aging">NSF AI Institute for Collaborative Assistance and Responsive Interaction for Networked Groups (AI-CARING)</a> will seek to create a vibrant discipline focused on personalized, collaborative AI systems that will improve quality of care for the aging. The systems will learn individual models of human behavior and how they change over time and use that knowledge to better collaborate and communicate in caregiving environments. Led by Sonia Chernova, associate professor of interactive computing at Georgia Tech, the AI systems will help a growing population of older adults sustain independence, improve quality of life, and increase effectiveness of care coordination across the care network.</p><p>&ldquo;The AI-CARING Institute builds on our existing strengths in AI and in technology for aging. It will create not only novel solutions, but a new generation of researchers focused on the interaction between the two,&rdquo; said Charles Isbell, dean and John P. Imlay Jr. Chair in the College of Computing. &ldquo;Our aim is to build cutting-edge technologies that improve the lives of everyone, and I can&rsquo;t think of a better example than AI-CARING.&rdquo;</p><p><a href="https://www.isye.gatech.edu/news/team-led-isyes-pascal-van-hentenryck-awarded-20m-nsf-grant-fund-center-study-ai-and">NSF AI Institute for Advances in Optimization (AI4Opt)</a> will revolutionize decision-making on a large scale &ndash; fusing AI and mathematical optimization into intelligent systems that will achieve breakthroughs that neither field can achieve independently. Additionally, it will create pathways from high school to undergraduate and graduate education and workforce development training for AI in engineering that will empower a generation of underrepresented students and teachers to join the AI revolution. Led by Pascal Van Hentenryck, A. Russell Chandler III chair and professor in the H. Milton Stewart School of Industrial and Systems Engineering at Georgia Tech, AI4Opt will tackle use cases in energy, resilience and sustainability, supply chains, and circuit design and control.</p><p>&ldquo;AI4Opt, with its focus on AI and optimization, will create new pathways for novel tools that allow better engineering applications to benefit society,&rdquo; said Raheem Beyah, dean of Georgia Tech&rsquo;s College of Engineering and Southern Company Chair. &ldquo;This will allow engineers to build&nbsp;higher quality&nbsp;materials, more efficient renewable resources, new computing systems, and more, while also reinforcing the field as a career path for diverse students.&nbsp;The new institute complements the College&rsquo;s commitment to the integration of AI in engineering disciplines.&rdquo;</p><p><a href="https://www.ic.gatech.edu/news/649137/georgia-tech-will-help-bring-critical-advancements-online-learning-part-multimillion">NSF AI Institute for Adult Learning and Online Education (ALOE)</a> will lead the country and the world in the development of novel AI theories and techniques for enhancing the quality of adult online education, making this mode of learning comparable to that of in-person education in STEM disciplines. Together with partners in the technical college systems and educational technology sector, ALOE will advance online learning using virtual assistants to make education more available, affordable, achievable, and ultimately more equitable. This Institute is led by the GRA, with support from Georgia Tech and the University System of Georgia (USG). Ashok Goel, professor in the School of Interactive Computing at Georgia Tech, will serve as executive director. &nbsp;</p><p>&ldquo;Online education for adults has enormous implications for tomorrow&rsquo;s workforce,&rdquo; said Myk Garn, a GRA senior advisor, assistant vice chancellor for New Models of Learning at the USG, and ALOE&rsquo;s principal investigator. &ldquo;Yet, serious questions remain about the quality of online learning and how best to teach adults online. Artificial intelligence offers a powerful technology for dramatically improving the quality of online learning and adult education.&rdquo;</p><p><strong>The Future of AI at Georgia Tech</strong></p><p>Georgia Tech is poised to strategically reimagine the future of AI. Currently, 66% of Georgia Tech undergraduate computer science students have an academic concentration in Intelligence, focusing on the top-to-bottom computational models of intelligence. The College of Computing&rsquo;s recently launched Ph.D. program in machine learning pulls from faculty in all six colleges across the Institute, and many new courses are being developed that teach AI as a tool for science and engineering. Georgia Tech is exploring the potential creation of a school or college of AI within the next five years, further building on its expansive AI and machine learning footprint. The NSF AI Institutes awards will enable all AI-related academic programs to scale and further differentiate Georgia Tech as a leader in AI education.&nbsp;&nbsp;&nbsp;</p><p>Additionally, the awards will expand and complement ongoing AI research efforts at the Georgia Tech Research Institute (GTRI). In the last fiscal year, GTRI received millions of dollars in research awards from the Department of Defense and other sponsors for AI-affiliated research, and currently, many GTRI researchers are focused on AI-affiliated projects.</p><p>&ldquo;As part of Georgia Tech, GTRI will greatly benefit from the advances in AI that will be achieved as a result of these NSF-funded Institutes, helping us further excel in our aim to deliver leading-edge AI research that benefits national security,&rdquo; said Mark Whorton, GTRI&rsquo;s chief technology officer. &ldquo;GTRI is one of the nation&rsquo;s leading institutes of applied research for national security specifically because of our deep engagement and close affiliation with the academic units of Georgia Tech. AI is a tool we use in conducting larger research objectives, and we believe strongly that these AI Institutes will enable GTRI to put more research into practice.&rdquo;</p><p>&ldquo;Georgia Tech has for decades now been pursuing new AI technologies, and now leads the way in AI that is responsible to the needs of the humans who use it,&rdquo; Isbell said. &ldquo;We have also worked hard to expand access to AI, especially for underrepresented groups. These Institutes will build on that history, expanding both our ability to create new technologies and to train the next generation of innovators. I look forward to watching them grow and develop.&rdquo;</p><p><strong>About the Georgia Institute of Technology</strong></p><p>The Georgia Institute of Technology, or Georgia Tech, is a top 10 public research university developing leaders who advance technology and improve the human condition. The Institute offers business, computing, design, engineering, liberal arts, and sciences degrees. Its nearly 40,000 students, representing 50 states and 149 countries, study at the main campus in Atlanta, at campuses in France and China, and through distance and online learning.&nbsp;As a leading technological university, Georgia Tech is an engine of economic development for Georgia, the Southeast, and the nation, conducting more than $1 billion in research annually for government, industry, and society.</p><p><strong>About the National Science Foundation </strong></p><p>The U.S. National Science Foundation propels the nation forward by advancing fundamental research in all fields of science and engineering. NSF supports research and people by providing facilities, instruments, and funding to support their ingenuity and sustain the U.S. as a global leader in research and innovation. With a fiscal year 2021 budget of $8.5 billion, NSF funds reach all 50 states through grants to nearly 2,000 colleges, universities, and institutions. Each year, NSF receives more than 40,000 competitive proposals and makes about 11,000 new awards. Those awards include support for cooperative research with industry, Arctic and Antarctic research and operations, and U.S. participation in international scientific efforts.</p><p><strong>About the Georgia Research Alliance</strong> </p><p>The Georgia Research Alliance (GRA) helps Georgia&rsquo;s university scientists do more research and start more companies. By expanding research and entrepreneurship capacity at public and private universities, GRA grows the Georgia economy by driving more investment in the state, developing a high-tech workforce, and strengthening Georgia&rsquo;s reputation for innovation.&nbsp;For 30 years, GRA has worked in partnership with the University System of Georgia and the Georgia Department of Economic Development to create the companies and jobs of Georgia&rsquo;s future. Visit <a href="https://gra.org/">GRA.org</a> for more information.</p><p>Contact: Georgia Parmelee | <a href="mailto:georgia.parmelee@gatech.edu">georgia.parmelee@gatech.edu</a> | 404.281.7818</p>]]></body>  <author>Georgia Parmelee</author>  <status>1</status>  <created>1627570839</created>  <gmt_created>2021-07-29 15:00:39</gmt_created>  <changed>1628267020</changed>  <gmt_changed>2021-08-06 16:23:40</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Today, Georgia Tech received two National Science Foundation Artificial Intelligence Research Institutes awards, totaling $40 million.]]></teaser>  <type>news</type>  <sentence><![CDATA[Today, Georgia Tech received two National Science Foundation Artificial Intelligence Research Institutes awards, totaling $40 million.]]></sentence>  <summary><![CDATA[<p>Georgia Tech received two National Science Foundation Artificial Intelligence Research Institutes awards, totaling $40 million. Over the next five years, Georgia Tech will make a substantial investment in AI that includes hiring an additional 100 researchers in the field, further solidifying its standing as a leader in the teaching and discovery of machine learning.</p>]]></summary>  <dateline>2021-07-29T00:00:00-04:00</dateline>  <iso_dateline>2021-07-29T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-07-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[georgia.parmelee@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Georgia Parmelee<br />georgia.parmelee@gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>649130</item>          <item>649128</item>          <item>649129</item>      </media>  <hg_media>          <item>          <nid>649130</nid>          <type>image</type>          <title><![CDATA[AI map]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[AI_map.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/AI_map.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/AI_map.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/AI_map.jpg?itok=ZhK6whBS]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[map of AI institutes in US]]></image_alt>                    <created>1627568719</created>          <gmt_created>2021-07-29 14:25:19</gmt_created>          <changed>1627568719</changed>          <gmt_changed>2021-07-29 14:25:19</gmt_changed>      </item>          <item>          <nid>649128</nid>          <type>image</type>          <title><![CDATA[PIs for AI Institues]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[nsf graphic-740px[52].jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/nsf%20graphic-740px%5B52%5D.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/nsf%20graphic-740px%5B52%5D.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/nsf%2520graphic-740px%255B52%255D.jpg?itok=AUxybhJ0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Pascal Van Hentenryck and Sonia Chernova]]></image_alt>                    <created>1627568604</created>          <gmt_created>2021-07-29 14:23:24</gmt_created>          <changed>1627576219</changed>          <gmt_changed>2021-07-29 16:30:19</gmt_changed>      </item>          <item>          <nid>649129</nid>          <type>image</type>          <title><![CDATA[Ashok headshot]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[ashok headshot.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/ashok%20headshot.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/ashok%20headshot.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/ashok%2520headshot.jpg?itok=neXCS_h8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Ashok Goel headshot]]></image_alt>                    <created>1627568645</created>          <gmt_created>2021-07-29 14:24:05</gmt_created>          <changed>1627572766</changed>          <gmt_changed>2021-07-29 15:32:46</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="443951"><![CDATA[School of Psychology]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="187023"><![CDATA[go-data]]></keyword>          <keyword tid="188087"><![CDATA[go-irim]]></keyword>          <keyword tid="188084"><![CDATA[go-ipat]]></keyword>          <keyword tid="173894"><![CDATA[ML@GT]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="648599">  <title><![CDATA[Forbes Touts Success of Tech’s OMSCS Program]]></title>  <uid>35797</uid>  <body><![CDATA[<p>Georgia Tech&rsquo;s <a href="http://www.omscs.gatech.edu/">Online Master of Science in Computer Science (OMSCS)</a>&nbsp;has been featured by <em>Forbes </em>magazine, which says it may be the most successful graduate degree program in the United States. The program celebrates eight years of being the first Master of Science in Computer Science that students can earn exclusively online &mdash; and for a fraction of the normal cost &mdash; from an accredited university. With an average cost of just $6,600 over five semesters, the tuition is about one-tenth of the median price tag for an on-campus master&rsquo;s degree in computer science at a private college or university.</p><p><em>Forbes </em>also reports that OMSCS accepts all applicants who meet the program&rsquo;s basic qualifications. So far, the program has accepted 74% of those who&rsquo;ve applied. Students from all 50 states and 124 countries have enrolled in the program, which earns rave reviews from its alumni<em>.</em></p><p>Former Dean of the College of Computing Zvi Galil shared with <em>Forbes</em> some of the success of OMSCS: &ldquo;Our motto is accessibility through affordability and technology &mdash; we are making a master&rsquo;s degree in computer science available to thousands of students.&rdquo;</p><p>One of the noteworthy features of the OMSCS program is that it has shown how successful massive open online courses can be.</p><p>&ldquo;They will provide access to high-quality education to a wider student population unserved by the current system of exclusion and escalating tuition. The idea and role of higher education institutes is to contribute to society through education. As technology provides the means to place higher education within reach of a greater number of people, our colleges and universities can fulfill their mission,&rdquo; Galil said.</p><p>Read the <em>Forbes</em> article <a href="https://www.forbes.com/sites/michaeltnietzel/2021/07/01/georgia-techs-online-ms-in-computer-science-continues-to-thrive-what-that-could-mean-for-the-future-of-moocs/?sh=7f4b1bfda277">here.</a></p>]]></body>  <author>Siobhan Rodriguez</author>  <status>1</status>  <created>1625680326</created>  <gmt_created>2021-07-07 17:52:06</gmt_created>  <changed>1625680326</changed>  <gmt_changed>2021-07-07 17:52:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Forbes Magazine features the success of Georgia Tech's OMSCS program]]></teaser>  <type>news</type>  <sentence><![CDATA[Forbes Magazine features the success of Georgia Tech's OMSCS program]]></sentence>  <summary><![CDATA[<p>Forbes Magazine features the success of Georgia Tech&#39;s OMSCS program</p>]]></summary>  <dateline>2021-07-07T00:00:00-04:00</dateline>  <iso_dateline>2021-07-07T00:00:00-04:00</iso_dateline>  <gmt_dateline>2021-07-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[sar30@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Siobhan Rodriguez</p><p>Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>648598</item>      </media>  <hg_media>          <item>          <nid>648598</nid>          <type>image</type>          <title><![CDATA[Forbes Touts Success of Tech’s OMSCS Program]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[OMSCS_program_Image.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/OMSCS_program_Image.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/OMSCS_program_Image.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/OMSCS_program_Image.jpg?itok=r3Hd3-ip]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1625680134</created>          <gmt_created>2021-07-07 17:48:54</gmt_created>          <changed>1625680134</changed>          <gmt_changed>2021-07-07 17:48:54</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="121521"><![CDATA[OMSCS]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="2308"><![CDATA[Forbes]]></keyword>          <keyword tid="171557"><![CDATA[Forbes Magazine]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="642123">  <title><![CDATA[FDA Enlists Georgia Tech to Establish Best Practices for RNA-sequencing]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Next-generation sequencing (NGS) has emerged as an important high throughput technology in biomedical research and translation for its ability to accurately capture genetic information. But choosing proper analysis methods for identifying biomarkers from high throughput data remains a critical challenge for most users.&nbsp;</p><p>For instance, RNA-sequencing (RNA-seq) is an NGS technology that examines the presence and quantity of RNA in biological samples, and it requires bioinformatics analysis to make sense of it all. However, there are hundreds of bioinformatics tools with different data analysis pipelines that result in various results for the same dataset. This can significantly hinder the ability to reliably reproduce RNA-seq related research and applications, especially for the regulatory approval process by the U.S. Food and Drug Administration (FDA).&nbsp;</p><p>Choosing the right analysis model and tool to do the proper job for high throughput data analysis remains a great challenge. So the FDA invited a team of researchers at the Georgia Institute of Technology to conduct a comprehensive investigation of RNA-seq data analysis pipelines for gene expression estimation to recommend best practices.&nbsp;</p><p>&ldquo;No common standard for selecting high throughput RNA-seq data analysis tools has been established yet. This has been a huge challenge for studying hundreds of tools that form tens of thousands of analysis pipelines,&rdquo; noted <a href="https://www.bme.gatech.edu/bme/faculty/May-Dongmei-Wang">May Dongmei Wang</a>, a professor in the <a href="https://www.bme.gatech.edu/">Wallace H. Coulter Department of Biomedical Engineering</a> at Georgia Tech and Emory University who led the investigation.</p><p>Wang and her colleagues presented their results in the journal <em>Nature Scientific Reports</em>. In their study, the researchers developed three metrics &ndash; accuracy, precision, and reliability &ndash; and systematically evaluated 278 representative NGS RNA-seq pipelines.&nbsp;</p><p>&ldquo;We demonstrate that those RNA-seq pipelines performing well in gene expression estimation will lead to the improved downstream prediction of disease outcome. This is an important discovery,&rdquo; said Wang, corresponding author of the paper, &ldquo;<a href="https://www.nature.com/articles/s41598-020-74567-y">Impact of RNA-seq Data Analysis Algorithms on Gene Expression Estimation and Downstream Prediction</a>.&rdquo;</p><p>She added, &ldquo;Because the FDA is a regulatory agency for approving novel medical devices for NGS-genomics to be utilized in daily clinical practices for personalized and precision medicine and health, it is critical to see whether gene expression generated from RNA-seq acquisition and analysis pipeline are reproducible and reliable.&rdquo;</p><p>The team&rsquo;s comprehensive investigation revealed that the high throughput RNA-seq data quantification modules &ndash; mapping, quantification, and normalization &ndash; jointly impacted the accuracy, precision, and reliability of gene expression estimation, which in turn affected the downstream clinical outcome prediction (as shown in two cancer case studies of neuroblastoma and lung adenocarcinoma).</p><p>&ldquo;Clinicians and biomedical researchers can use our findings to select RNA-seq pipelines for their clinical practice or research,&rdquo; Wang said. &ldquo;And bioinformaticians can use these benchmark datasets, results, and metrics to develop and evaluate new RNA-seq tools and pipelines.&rdquo;</p><p>But one size does not fit every need, as in any machine learning paradigm, Wang noted.&nbsp;</p><p>&ldquo;The machine learning and algorithms are heavily dependent on goals,&rdquo; she said. &ldquo;Thus, based on our extensive experience in biomedical big data analytics and AI for almost two decades, we suggested that the FDA identify top goals for clinical genomics applications first. Based on different needs, different RNA-seq pipelines will be selected to achieve the optimal performance.&rdquo;</p><p>In addition to Wang, the research team included lead author Li Tong, Po-Yen Wu, John H. Phan, Hamid R. Hassazadeh, Weida Tong, and members of the FDA&rsquo;s Sequencing Quality Control project (Wendell D. Jones, Leming Shi, Matthias Fischer, Christopher E. Mason, Sheng Li, Joshua Xu, Wei Shi, Jian Wang, Jean Thierry-Mieg, Danielle Thierry-Mieg, Falk Hertwig, Frank Berthold, Barbara Hero, Yang Liao, Gordon K. Smyth, David Kreil, Pawel&nbsp;P. Tabaj, Dalila Megherbi, Gary Schroth, and Hong Fang).</p><p><em>This work was supported by grants from the National Institutes of Health (U54CA119338, R01CA163256, and UL1TR000454), the National Science Foundation (EAGER Award NSF1651360), Children&#39;s Healthcare of Atlanta and Georgia Tech Partnership Grant, Giglio Breast Cancer Research Fund, the Centers for Disease Control and Prevention (CDC), and the Carol Ann and David D. Flanagan Faculty Fellow Research Fund.</em></p><p><strong>CITATION</strong>: Li Tong, et al., &ldquo;Impact of RNA-seq Data Analysis Algorithms on Gene Expression Estimation and Downstream Prediction.&rdquo; (<em>Nature Scientific Reports</em> 2020)</p><p>Writer: Jerry Grillo</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1607996720</created>  <gmt_created>2020-12-15 01:45:20</gmt_created>  <changed>1607997091</changed>  <gmt_changed>2020-12-15 01:51:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers have helped select the right RNA-seq data analysis tools.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers have helped select the right RNA-seq data analysis tools.]]></sentence>  <summary><![CDATA[<p>Next-generation sequencing (NGS) has emerged as an important high throughput technology in biomedical research and translation for its ability to accurately capture genetic information. But choosing proper analysis methods for identifying biomarkers from high throughput data remains a critical challenge for most users.&nbsp;</p>]]></summary>  <dateline>2020-12-14T00:00:00-05:00</dateline>  <iso_dateline>2020-12-14T00:00:00-05:00</iso_dateline>  <gmt_dateline>2020-12-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>642121</item>          <item>642122</item>      </media>  <hg_media>          <item>          <nid>642121</nid>          <type>image</type>          <title><![CDATA[May Wang Portrait]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[MIBLab_6718.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/MIBLab_6718.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/MIBLab_6718.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/MIBLab_6718.jpg?itok=JsWFaDz6]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[May Wang photo]]></image_alt>                    <created>1607995842</created>          <gmt_created>2020-12-15 01:30:42</gmt_created>          <changed>1607995842</changed>          <gmt_changed>2020-12-15 01:30:42</gmt_changed>      </item>          <item>          <nid>642122</nid>          <type>image</type>          <title><![CDATA[Choosing right analysis model]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[MayWang_SEQC-2_DSC_6710.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/MayWang_SEQC-2_DSC_6710.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/MayWang_SEQC-2_DSC_6710.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/MayWang_SEQC-2_DSC_6710.jpg?itok=LEM3Vqei]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[May Wang with sequencing]]></image_alt>                    <created>1607996015</created>          <gmt_created>2020-12-15 01:33:35</gmt_created>          <changed>1607996367</changed>          <gmt_changed>2020-12-15 01:39:27</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="140"><![CDATA[Cancer Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="140"><![CDATA[Cancer Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="984"><![CDATA[RNA]]></keyword>          <keyword tid="186451"><![CDATA[RNA-sequencing]]></keyword>          <keyword tid="126571"><![CDATA[go-PetitInstitute]]></keyword>          <keyword tid="186452"><![CDATA[next-generation sequencing]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="641041">  <title><![CDATA[Large-area Flexible Organic Photodiodes Can Compete With Silicon Devices]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The performance of flexible large-area organic photodiodes has advanced to the point that they can now offer advantages over conventional silicon photodiode technology, particularly for applications such as biomedical imaging and biometric monitoring that require detecting low levels of light across large areas.</p><p>The low-noise, solution-processed, flexible organic devices offer the ability to use arbitrarily shaped, large-area photodiodes to replace complex arrays that would be required with conventional silicon photodiodes, which can be expensive to scale up for large-area applications. The organic devices provide performance comparable to that of rigid silicon photodiodes in the visible light spectrum &mdash; except in response time.</p><p>&ldquo;What we have achieved is the first demonstration that these devices, produced from solution at low temperatures, can detect as little as a few hundred thousand photons of visible light every second, similar to the magnitude of light reaching our eye from a single star in a dark sky,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/canek-fuentes-hernandez">Canek Fuentes-Hernandez</a>, principal research scientist in the <a href="https://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. &ldquo;The ability to coat these materials onto large-area substrates with arbitrary shapes means that flexible organic photodiodes now offer some clear advantages over state-of-the-art silicon photodiodes in applications requiring response times in the range of tens of microseconds.&rdquo;</p><p>The development and performance of large-area, low-noise organic photodiodes are described in the Nov. 6 issue of the journal <em>Science</em>. The research was supported by multiple organizations, including the Office of Naval Research, the Air Force Office of Scientific Research, and the U.S. Department of Energy&rsquo;s National Nuclear Security Administration.</p><p>Organic electronic devices are based on materials fabricated from carbon-based molecules or polymers instead of conventional inorganic semiconductors such as silicon. The devices can be made using simple solution and inkjet printing techniques instead of the expensive and complex processes involved in the manufacturing of conventional electronics. The technology is now widely used in displays, solar cells, and other devices.</p><p>The organic photodiodes use polyethylenimine, an amine-containing polymer surface modifier found to produce air-stable, low work-function electrodes in photovoltaic devices developed in the laboratory of <a href="https://www.ece.gatech.edu/faculty-staff-directory/bernard-j-kippelen">Bernard Kippelen</a>, Joseph M. Pettit Professor at Georgia Tech. The use of polyethylenimine was also shown to produce photovoltaic devices with low levels of dark current &mdash; the electrical current that flows through a device even in the dark. This meant the materials could be useful in photodetectors for capturing faint signals of visible light.&nbsp;</p><p>&ldquo;Over the years, the dark current levels were reduced so much that measurement equipment had to be redesigned to detect an electronic noise corresponding to a fluctuation of one electron in one millionth of a second,&rdquo; Fuentes-Hernandez, the paper&rsquo;s first author, said. &ldquo;This work reflects sustained team efforts made in the Kippelen group over more than six years and encompasses part of the Ph.D. work of recent graduates Talha Kahn and Wen-Fang Chou. These collective efforts produced the scientific insights needed to demonstrate organic photodiodes with this level of performance.&rdquo;&nbsp;</p><p>One application for the new devices is in pulse oximeters now placed on fingers to measure heart rate and blood oxygen levels. Organic photodiodes may allow multiple devices to be placed on the body and operate with 10 times less light than conventional devices. This could enable wearable health monitors to produce improved physiological information and continuous monitoring without frequent battery changes. Other potential applications include human-computer interfaces such as touchless gesture recognition and controls.&nbsp;&nbsp;</p><p>A future application is detection of ionizing radiation by scintillation &mdash; a flash of light emitted by a phosphor when struck by a high energy particle. Lowering the level of light that can be detected would improve the sensitivity of the device, allowing it to detect lower levels of radiation. Detecting radiation emitted from vehicles or cargo containers requires a large detector area, which would be easier to make from organic photodiodes than from arrays of silicon photodiodes.</p><p>Organic photodiodes could have similar advantages in X-ray equipment, where doctors want to use the smallest level of radiation possible to minimize the dose delivered to the patient. Here again, sensitivity, large area, and flexible form factor should give organic photodiodes an advantage over silicon-based arrays.&nbsp;</p><p>&ldquo;We are working on improving the response time of the photodetector because producing fast photodetectors would enable many additional important applications,&rdquo; Fuentes-Hernandez said. &ldquo;There&rsquo;s a real need to develop photodetector technologies that are more scalable, and one of the motivations of this work is to advance organic technology that we know is cost effective for scaling.&rdquo;</p><p>The organic photodiodes can show electronic noise current values in the tens of femtoampere range and noise equivalent power values of a couple of hundreds of femtowatt. Key performance factors of the organic photodiodes compare well with silicon except in the area of response time, where researchers are working on a hundred-fold improvement to enable future applications.&nbsp;</p><p>&ldquo;Because we use materials that are processed from inks using printing techniques, they are not as ordered as crystalline materials,&rdquo; Kippelen said. &ldquo;As a result, the carrier mobility and the velocity of the carriers that can move through these materials are lower, so you can&rsquo;t get the same fast signals you get with silicon. But for many applications you don&rsquo;t need picosecond or nanosecond response time.&rdquo;</p><p>For Kippelen, the photodiode work shows the results of a 25-year effort to improve the performance of organic electronic materials. That work, part of Georgia Tech&rsquo;s <a href="https://cope.gatech.edu/">Center for Organic Photonics and Electronics</a>, has involved extensive device modeling to understand the basic science, and research to continuously boost performance of the materials.</p><p>&ldquo;Organic thin films absorb light more efficiently than silicon, so the overall thickness you need to absorb that light is very small,&rdquo; Kippelen said. &ldquo;Even if you scale their area up, the overall volume of your detector remains small with organics. If you increase the area of a silicon detector, you have a larger volume of materials that at room temperature will generate a lot of electronic noise.&rdquo;</p><p>The photodiodes made in Kippelen&rsquo;s lab use an active layer just 500 nanometers thick. A gram of the material, roughly the size of a fingertip, could coat the surface of an office desk.</p><p>Kippelen hopes the <em>Science</em> paper will help open new doors for organic semiconductors.</p><p>&ldquo;Advances like this will allow us to change the conventional wisdom that switching to organic materials that can lead to scalable devices would mean giving up performance,&rdquo; he said. &ldquo;We can&rsquo;t anticipate all the new applications that could be enabled by this advance.&rdquo;</p><p>In addition to those already mentioned, the research team included Larissa Diniz, Julia Lukens, Felipe A. Larrain, and Victor A. Rodriguez-Toro, all associated with Kippelen&rsquo;s lab.</p><p><em>This research was supported by the Department of the Navy, Office of Naval Research Awards N00014-15 14-1-0580 and N00014-16-1-2520; through the MURI Center for Advanced Organic Photovoltaics (CAOP); by the Air Force Office of Scientific Research through Award No. FA9550-16-1-0168, the Department of Energy / National Nuclear Security Administration (NNSA) awards DE-NA0002576 through the Consortium for Nonproliferation Enabling Capabilities (CNEC), and award DE-NA0003921 through the Consortium for Enabling Technologies and Innovation. Support also came from the Chilean National Commission for Scientific and Technological Research through the Doctoral Fellowship program &lsquo;&lsquo;Becas Chile,&rsquo;&rsquo; Grant 72150387; from the Colombian Administrative Department of Science, Technology, and Innovation through the program Fulbright-Colciencias; from the National Science Foundation through the Research Experiences for Undergraduates program; and from the Brazil Scientific Mobility Program through an Academic Training Opportunities grant.</em></p><p><strong>CITATION</strong>: Canek Fuentes-Hernandez, et al., &ldquo;Large-area low-noise flexible organic photodiodes for detecting faint visible light.&rdquo; (<em>Science</em> 2020).</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1604601880</created>  <gmt_created>2020-11-05 18:44:40</gmt_created>  <changed>1604602007</changed>  <gmt_changed>2020-11-05 18:46:47</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Flexible large-area organic photodiodes can now compete in performance with conventional silicon photodiode technology.]]></teaser>  <type>news</type>  <sentence><![CDATA[Flexible large-area organic photodiodes can now compete in performance with conventional silicon photodiode technology.]]></sentence>  <summary><![CDATA[<p>The performance of flexible large-area organic photodiodes has advanced to the point that they can now offer advantages over conventional silicon photodiode technology, particularly for applications such as biomedical imaging and biometric monitoring that require detecting low levels of light across large areas.</p>]]></summary>  <dateline>2020-11-05T00:00:00-05:00</dateline>  <iso_dateline>2020-11-05T00:00:00-05:00</iso_dateline>  <gmt_dateline>2020-11-05 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>641037</item>          <item>641038</item>          <item>641039</item>          <item>641040</item>      </media>  <hg_media>          <item>          <nid>641037</nid>          <type>image</type>          <title><![CDATA[Organic photodiodes versus silicon]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[organic-photodiodes-1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/organic-photodiodes-1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/organic-photodiodes-1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/organic-photodiodes-1.jpg?itok=SmElnoXD]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Organic and silicon photodiodes for comparison]]></image_alt>                    <created>1604600682</created>          <gmt_created>2020-11-05 18:24:42</gmt_created>          <changed>1604600682</changed>          <gmt_changed>2020-11-05 18:24:42</gmt_changed>      </item>          <item>          <nid>641038</nid>          <type>image</type>          <title><![CDATA[Rigid and flexible photodiodes]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[organic-photodiodes-2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/organic-photodiodes-2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/organic-photodiodes-2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/organic-photodiodes-2.jpg?itok=gfrmOyG9]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researcher holds rigid and flexible photodiodes]]></image_alt>                    <created>1604600792</created>          <gmt_created>2020-11-05 18:26:32</gmt_created>          <changed>1604600792</changed>          <gmt_changed>2020-11-05 18:26:32</gmt_changed>      </item>          <item>          <nid>641039</nid>          <type>image</type>          <title><![CDATA[Ring-shaped large-area photodiode]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[organic-photodiodes-3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/organic-photodiodes-3.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/organic-photodiodes-3.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/organic-photodiodes-3.jpg?itok=0WiSv_x0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researcher holding ring-shaped organic photodiode]]></image_alt>                    <created>1604600913</created>          <gmt_created>2020-11-05 18:28:33</gmt_created>          <changed>1604600913</changed>          <gmt_changed>2020-11-05 18:28:33</gmt_changed>      </item>          <item>          <nid>641040</nid>          <type>image</type>          <title><![CDATA[Flexible ring-shaped large-area organic photodiode]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[organic-photodiodes-4.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/organic-photodiodes-4.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/organic-photodiodes-4.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/organic-photodiodes-4.jpg?itok=YnoPhAtj]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Flexible ring-shaped large-area organic photodiode]]></image_alt>                    <created>1604601017</created>          <gmt_created>2020-11-05 18:30:17</gmt_created>          <changed>1604601017</changed>          <gmt_changed>2020-11-05 18:30:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="7328"><![CDATA[photodiode]]></keyword>          <keyword tid="186209"><![CDATA[organic photodiode]]></keyword>          <keyword tid="5917"><![CDATA[organic electronics]]></keyword>          <keyword tid="12373"><![CDATA[flexible electronics]]></keyword>          <keyword tid="7292"><![CDATA[light]]></keyword>          <keyword tid="2431"><![CDATA[Bernard Kippelen]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="640976">  <title><![CDATA[Dense Microgel Suspensions Reveal In-silico What Happens Under Compression]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Microgel suspensions made up of microscopic liquid-filled polymer particles occupy a curious physical state somewhere between liquid and solid, giving them unique properties and potential uses in self-healing structures, optically active materials, microreactors, drug-delivery systems, and templates for regenerating living structures such as bone and muscle.</p><p>Using large-scale computer simulations, researchers at the Georgia Institute of Technology have now mapped out the surprising behavior and mechanics of these complex particle-solvent systems, learning how the &ldquo;soft and squishy&rdquo; particles deform, swell, de-swell, and penetrate each other as they respond to compression. The findings could help guide the design of microgel-based applications with unique and useful properties.</p><p>&ldquo;We wanted to understand broadly what happens to these particles if you put them together and start compressing them,&rdquo; said <a href="http://www.me.gatech.edu/faculty/alexeev">Alexander Alexeev</a>, professor and Anderer Faculty Fellow in Georgia Tech&rsquo;s <a href="http://www.me.gatech.edu">George W. Woodruff School of Mechanical Engineering</a>. &ldquo;Unlike rigid particles that fill the available space and then stop compressing, these particles have multiple processes that can work in parallel inside the suspension. Microgels can change shape, shrink, and penetrate one another. We found that these processes play a varying role when you increase the particle number density and compress them enough.&rdquo;</p><p>Findings of the study were reported October 19 in the journal <em>Proceedings of the National Academy of Sciences</em>. The research was supported by the National Science Foundation (NSF) and the MCIU/AEI/FEDER EU, and simulations utilized the NSF&rsquo;s Extreme Science and Engineering Discovery Environment.</p><p>Using mesoscale computer simulations, the researchers studied the behavior of compressed suspensions consisting of shape-shifting microgels with different architectures at a variety of packing fractions and solvent conditions. They found that under compression, the &ldquo;fluffy&rdquo; microgels &mdash; which resemble microscopic sponges with polymer threads extending from them &mdash; change shape and shrink, with limited interpenetration among particles.</p><p>&ldquo;You can use their softness and the fact that they change shape to pack them even more,&rdquo; said <a href="https://www.icrea.cat/Web/ScientificStaff/alberto-fernandez-nieves-280811">Alberto Fernandez-Nieves</a>, ICREA Professor in the Department of Condensed Matter Physics at the University of Barcelona and adjunct professor in Georgia Tech&rsquo;s <a href="http://physics.gatech.edu">School of Physics</a>. &ldquo;There are a variety of mechanisms to pack them into an available volume, and these mechanisms may play a different role depending on the situation. Until this study, we didn&rsquo;t quite know how the microgels could be packed together beyond random close packing.&rdquo;</p><p>Their ability to release solvent allows the microgels to shrink and deform, unlike hard particles in regular colloidal suspensions. In addition, the polymer threads allow them to interpenetrate and overlap to pack more particles into a given space. The microgel particles range in size from 50 nanometers up to as much as 10 microns in diameter. In their simulations, Alexeev, Fernandez-Nieves, and recent Ph.D. graduate Svetoslav Nikolov studied suspensions containing about a hundred microgel particles.</p><p>&ldquo;Their compressibility is a new ingredient that is not present in other soft particles, and it can bring about the fascinating and unique aspects of these microgel systems,&rdquo; said Fernandez-Nieves. &ldquo;This study gives us information we need to exploit this softness to achieve things we wouldn&rsquo;t be able to do otherwise.&rdquo;</p><p>The simulations provided information about the effects of variables such as solvent type and degree of compression on the mechanical properties of the microgels in the suspension.</p><p>&ldquo;If you look at the mechanical properties of the suspension in different solvents, you see the curves are very different,&rdquo; Alexeev said. &ldquo;If they are swollen, they are fluffy and can move around in the suspension. If they expel solvent, they can become almost dry, so the mechanical properties can change dramatically. What we found is surprising and not at all what people expected.&rdquo;&nbsp;</p><p>Among the key fundamental findings is that the mechanical properties of the suspension can be quantified in terms of the single microgel bulk modulus. &ldquo;It is how these particles compress that determines the material properties of the whole suspension when it is sufficiently concentrated,&rdquo; Fernandez-Nieves said.</p><p>&ldquo;You can have many different kinds of behavior, but when you scale all the behaviors by the actual compressibility of one microgel, all the behaviors come together,&rdquo; he added. &ldquo;That means this quantity seems to be the important one to consider to understand the macroscopic properties of the suspension.&rdquo;&nbsp;</p><p>The researchers used the NSF&rsquo;s <a href="https://www.xsede.org/">Extreme Science and Engineering Discovery Environment</a> to simulate the microgel systems. While the behavior of ordinary particle-based systems might seem straightforward to study, the compressibility of the microgels coupled with the complexity of the polymer crosslinking made the simulation quite large, Alexeev noted.</p><p>&ldquo;A single particle is already a quite complicated system,&rdquo; he said. &ldquo;The computational complexity provided findings that we hope will encourage experimentalists to further explore what these unique systems can do.&rdquo;</p><p><em>This research was supported by the NSF Faculty Early Career Development (CAREER) Award DMR-1255288, the MCIU/AEI/FEDER, EU (Grant PGC2018-336 097842-B-I00), and NSF Graduate Research Fellowship DGE-1650044. The simulations were performed using the computational resources of the Extreme Science and Engineering Discovery Environment provided through NSF Awards DMR-180038 and DMR-180026. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies.</em></p><p><strong>CITATION</strong>: Svetoslav V. Nikolov, Alberto Fernandez-Nieves, and Alexander Alexeev, &ldquo;Behavior and mechanics of dense microgel suspensions&rdquo; (<em>Proceedings of the National Academy of Sciences</em>, 2020). <a href="https://doi.org/10.1073/pnas.2008076117">https://doi.org/10.1073/pnas.2008076117</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1604537854</created>  <gmt_created>2020-11-05 00:57:34</gmt_created>  <changed>1604537907</changed>  <gmt_changed>2020-11-05 00:58:27</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Simulations of microgel suspensions show the surprising behavior of these materials when they are compressed.]]></teaser>  <type>news</type>  <sentence><![CDATA[Simulations of microgel suspensions show the surprising behavior of these materials when they are compressed.]]></sentence>  <summary><![CDATA[<p>Microgel suspensions made up of microscopic liquid-filled polymer particles occupy a curious physical state somewhere between liquid and solid, giving them unique properties and potential uses in self-healing structures, optically active materials, microreactors, drug-delivery systems, and templates for regenerating living structures such as bone and muscle.</p>]]></summary>  <dateline>2020-11-04T00:00:00-05:00</dateline>  <iso_dateline>2020-11-04T00:00:00-05:00</iso_dateline>  <gmt_dateline>2020-11-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>640974</item>          <item>640975</item>      </media>  <hg_media>          <item>          <nid>640974</nid>          <type>image</type>          <title><![CDATA[Microgel packing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[microgel-packing.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/microgel-packing.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/microgel-packing.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/microgel-packing.jpg?itok=_TE9RoMU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Illustration of microgels packing into a limited volume]]></image_alt>                    <created>1604537061</created>          <gmt_created>2020-11-05 00:44:21</gmt_created>          <changed>1604537061</changed>          <gmt_changed>2020-11-05 00:44:21</gmt_changed>      </item>          <item>          <nid>640975</nid>          <type>image</type>          <title><![CDATA[Microgel snapshots]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[microgel-snapshots.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/microgel-snapshots.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/microgel-snapshots.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/microgel-snapshots.jpg?itok=hbn_HIkw]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Illustration of swollen microgels]]></image_alt>                    <created>1604537138</created>          <gmt_created>2020-11-05 00:45:38</gmt_created>          <changed>1604537138</changed>          <gmt_changed>2020-11-05 00:45:38</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="3345"><![CDATA[microgel]]></keyword>          <keyword tid="186195"><![CDATA[microgel suspension]]></keyword>          <keyword tid="1492"><![CDATA[Polymer]]></keyword>          <keyword tid="170178"><![CDATA[self-healing]]></keyword>          <keyword tid="186196"><![CDATA[microreactor]]></keyword>          <keyword tid="5910"><![CDATA[Drug Discovery]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="639431">  <title><![CDATA[Ultra-Low-Cost Hearing Aid Could Address Age-Related Hearing Loss Worldwide]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Using a device that could be built with a dollar&rsquo;s worth of open-source parts and a 3D-printed case, researchers want to help the hundreds of millions of older people worldwide who can&rsquo;t afford existing hearing aids to address their age-related hearing loss.</p><p>The ultra-low-cost, proof-of-concept device known as LoCHAid is designed to be easily manufactured and repaired in locations where conventional hearing aids are priced beyond the reach of most citizens. The minimalist device is expected to meet most of the World Health Organization&rsquo;s targets for hearing aids aimed at mild to moderate age-related hearing loss. The prototypes built so far look like wearable music players instead of a traditional behind-the-ear hearing aids.&nbsp;</p><p>&ldquo;The challenge we set for ourselves was to build a minimalist hearing aid, determine how good it would be, and ask how useful it would be to the millions of people who could use it,&rdquo; said <a href="https://www.chbe.gatech.edu/people/saad-bhamla">M. Saad Bhamla</a>, an assistant professor in the <a href="http://www.chbe.gatech.edu">School of Chemical and Biomolecular Engineering</a> at the Georgia Institute of Technology. &ldquo;The need is obvious because conventional hearing aids cost a lot and only a fraction of those who need them have access.&rdquo;</p><p>Details of the project are described Sept. 23 in the journal <em>PLOS ONE</em>.</p><p>Age-related hearing loss affects more than 200 million adults over the age of 65 worldwide. Hearing aid adoption remains relatively low, particularly in low- and middle-income countries where fewer than 3% of adults use the devices &mdash; compared to 20% in wealthier countries. Cost is a significant limitation, with the average hearing aid pair costing $4,700 in the United States and even low-cost personal sound amplification devices &mdash; which don&rsquo;t meet the criteria for sale as hearing aids &mdash; priced at hundreds of dollars globally.</p><p>Part of the reason for the high cost is that effective hearing aids provide far more than just sound amplification. Hearing loss tends to occur unevenly at different frequencies, so boosting all sound can actually make speech comprehension more difficult. Because decoding speech is so complicated for the human brain, the device must also avoid distorting the sound or adding noise that could hamper the user&rsquo;s ability to understand.</p><p>Bhamla and his team chose to focus on age-related hearing loss because older adults tend to lose hearing at higher frequencies. Focusing on a large group with similar hearing losses simplified the design by narrowing the range of sound frequency amplification needed.&nbsp;</p><p>Modern hearing aids use digital signal processors to adjust sound, but these components were too expensive and power hungry for the team&rsquo;s goal. The team therefore decided to build their device using electronic filters to shape the frequency response, a less expensive approach that was standard on hearing aids before the processors became widely available.&nbsp;</p><p>&ldquo;Taking a standard such as linear gain response and shaping it using filters dramatically reduces the cost and the effort required for programming,&rdquo; said Soham Sinha, the paper&rsquo;s first author, who was born in semirural India and is a long-term user of hearing aid technology.</p><p>&ldquo;I was born with hearing loss and didn&rsquo;t get hearing aids until I was in high school,&rdquo; said Sinha, who worked on the project while a Georgia Tech undergraduate and is now a Ph.D. student at Stanford University. &ldquo;This project represented for me an opportunity to learn what I could do to help others who may be in the same situation as me but not have the resources to obtain hearing aids.&rdquo;</p><p>The ability to hear makes a critical quality of life difference, especially to older people who may have less access to social relationships, said Vinaya Manchaiah, professor of speech and hearing sciences at Lamar University and another member of the research team. &ldquo;Hearing has a direct impact on how we feel and how we behave,&rdquo; he said. &ldquo;For older adults, losing the ability to hear can result in a quicker and larger cognitive decline.&rdquo;</p><p>The inexpensive hearing aid developed by Bhamla&rsquo;s team can obviously not do everything that the more expensive devices can do, an issue Manchaiah compares to &ldquo;purchasing a basic car versus a luxury car. If you ask most users, a basic car is all you need to be able to get from point a to point b. But in the hearing aid world, not many companies make basic cars.&rdquo;</p><p>For Manchaiah, the issue is whether the prototype device provides sufficient value for the cost. The researchers have extensively studied the electroacoustic performance of their device, but the real test will come in clinical and user trials that will be necessary before it can be certified as a medical device.</p><p>&ldquo;When we talk about hearing aids, even the lowest of technology is quite high in price for people in many parts of the world,&rdquo; he said. &ldquo;We may not need to have the best technology or the best device in order to provide value and a good experience in hearing.&rdquo;</p><p>The electronic components of the LoCHAid cost less than a dollar if purchased in bulk, but that doesn&rsquo;t include assembly or distribution costs. Its relatively large size allows for low-tech assembly and even do-it-yourself production and repair. The prototype uses a 3D-printed case and is powered by common AA or lithium ion coin-cell batteries designed to keep costs as low as possible. With its focus on older adults, the device could be sold online or over the counter, Bhamla said.</p><p>&ldquo;We have shown that it is possible to build a hearing aid for less than the price of a cup of coffee,&rdquo; he said. &ldquo;This is a first step, a platform technology, and we&rsquo;ve shown that low cost doesn&rsquo;t have to mean low quality.&rdquo;</p><p>Among the device&rsquo;s drawbacks are its large size, an inability to adjust frequency ranges, and an expected lifetime of just a year and a half. The cost of batteries is often a hidden burden for hearing aid users, and the AA batteries are expected to last up to three weeks, which is still an improvement from the 4-5 day life expectancy of common zinc-air batteries in current hearing aids.</p><p>The researchers are now working on a smaller version of the device that will boost the bulk component cost to $7 and require a sophisticated manufacturer to assemble. &ldquo;We&rsquo;ll no longer be able to solder them ourselves in the lab,&rdquo; said Bhamla, whose research focuses on frugal science. &ldquo;This is a labor of love for us, so we will miss that.&rdquo;</p><p>CITATION: Soham Sinha, Urvaksh D. Irani, Vinaya Manchaiah, and M. Saad Bhamla, &ldquo;LoCHAid: An ultra-low-cost hearing aid for age-related hearing loss.&rdquo; (<em>PLOS ON</em>E, 2020). <a href="https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0238922">https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0238922</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1600880689</created>  <gmt_created>2020-09-23 17:04:49</gmt_created>  <changed>1600880946</changed>  <gmt_changed>2020-09-23 17:09:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed an ultra-low-cost hearing aid to help the hundred of millions of people with age-related hearing loss.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed an ultra-low-cost hearing aid to help the hundred of millions of people with age-related hearing loss.]]></sentence>  <summary><![CDATA[<p>Using a device that could be built with a dollar&rsquo;s worth of open-source parts and a 3D-printed case, researchers want to help the hundreds of millions of older people worldwide who can&rsquo;t afford existing hearing aids to address their age-related hearing loss.</p>]]></summary>  <dateline>2020-09-23T00:00:00-04:00</dateline>  <iso_dateline>2020-09-23T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-09-23 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>639423</item>          <item>639424</item>          <item>639425</item>          <item>639426</item>      </media>  <hg_media>          <item>          <nid>639423</nid>          <type>image</type>          <title><![CDATA[Electronics for low-cost hearing aid]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[LoCHAid-9862.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/LoCHAid-9862.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/LoCHAid-9862.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/LoCHAid-9862.jpg?itok=R72-kJ88]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Electronic components being assembled]]></image_alt>                    <created>1600876356</created>          <gmt_created>2020-09-23 15:52:36</gmt_created>          <changed>1600876356</changed>          <gmt_changed>2020-09-23 15:52:36</gmt_changed>      </item>          <item>          <nid>639424</nid>          <type>image</type>          <title><![CDATA[Georgia Tech Assistant Professor Saad Bhamla]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[LoCHAid_9847.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/LoCHAid_9847.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/LoCHAid_9847.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/LoCHAid_9847.jpg?itok=nDXBNYgb]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Saad Bhamla assembling hearing aid]]></image_alt>                    <created>1600876488</created>          <gmt_created>2020-09-23 15:54:48</gmt_created>          <changed>1600876488</changed>          <gmt_changed>2020-09-23 15:54:48</gmt_changed>      </item>          <item>          <nid>639425</nid>          <type>image</type>          <title><![CDATA[Saad Bhamla in laboratory]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[LoCHAid_9810.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/LoCHAid_9810.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/LoCHAid_9810.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/LoCHAid_9810.jpg?itok=03Q1IzhL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Saad Bhamla posed in the laboratory]]></image_alt>                    <created>1600876590</created>          <gmt_created>2020-09-23 15:56:30</gmt_created>          <changed>1600876590</changed>          <gmt_changed>2020-09-23 15:56:30</gmt_changed>      </item>          <item>          <nid>639426</nid>          <type>image</type>          <title><![CDATA[Components of the LoCHAid device ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[LoCHAid-01.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/LoCHAid-01.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/LoCHAid-01.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/LoCHAid-01.png?itok=oLpgAjru]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Person wearing LoCHAid, components]]></image_alt>                    <created>1600876702</created>          <gmt_created>2020-09-23 15:58:22</gmt_created>          <changed>1600876702</changed>          <gmt_changed>2020-09-23 15:58:22</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="185914"><![CDATA[hearing aid]]></keyword>          <keyword tid="185915"><![CDATA[hearing loss]]></keyword>          <keyword tid="5156"><![CDATA[open-source]]></keyword>          <keyword tid="177841"><![CDATA[Saad Bhamla]]></keyword>          <keyword tid="181392"><![CDATA[frugal science]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="638477">  <title><![CDATA[COVID Central App Checks Symptoms, Provides Links to Key Campus Resources]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Georgia Tech has launched a new web app to help students, faculty, and staff check for symptoms of Covid-19, access links to important campus coronavirus resources &ndash; including the <a href="https://news.gatech.edu/2020/08/17/novid-exposure-notification-app-enlists-smartphones-coronavirus-battle">NOVID</a> exposure app &ndash; and track infection reports in the campus community. The web-based app, known as <a href="https://covid-central.gatech.edu/app/welcome">COVID Central</a>, can be accessed from computers, tablets, and smartphones.</p><p>COVID Central collects no personally identifiable information from users, and can be used for the symptom check that members of the Georgia Tech community are expected to make before leaving for work or classes each day. The app was built by researchers from the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI) and is available at <a href="https://covid-central.gatech.edu/app/welcome">covid-central.gatech.edu/app/welcome</a>.</p><p>&ldquo;The symptom checker is the heart of the app, and it helps users understand what to do if they report having the CDC-established signs of infection or have been exposed to someone with the virus,&rdquo; said Jon Duke, director of Georgia Tech&rsquo;s <a href="http://chai.gatech.edu/">Center for Health Analytics and Informatics</a>. &ldquo;No personal information is being collected, but the aggregated data should be useful to help campus health authorities identify trends in the types of symptoms on campus.&rdquo;</p><p>The app&rsquo;s symptom checker asks users to indicate if they are suffering from any of the nine disease indicators that are shown on Georgia Tech&rsquo;s coronavirus health site. If the user reports any of the common Covid-19 symptoms, the app can ask about their severity &ndash; such as trouble breathing or bluish lips. It also asks if the user has been exposed to a person diagnosed with Covid-19.</p><p>Based on answers to the questions, the app recommends a course of action. Those with severe symptoms are advised to call 911 for immediate medical assistance. Those with mild symptoms are advised to stay at home and monitor their condition. People who have been exposed to the virus but aren&rsquo;t experiencing symptoms are asked to self-isolate for 14 days.</p><p>Those who have no symptoms or exposure risks are advised to protect themselves by social distancing, washing their hands, wearing a mask, and getting tested regularly.&nbsp;</p><p>&ldquo;We&rsquo;ve made the symptom tracker as simple and quick to use as possible,&rdquo; said Trey Schneider, a GTRI research engineer who produced the app. &ldquo;It provides a guide to users based on their current symptoms and exposures. The goal is for members of the community to use it every day.&rdquo;</p><p>In addition to the symptom tracker, COVID Central provides links to such resources as the NOVID exposure notification app, the campus coronavirus status web page, prevention advice, information on testing, the Campus Recreation Center, housing, and dining services for those on campus.</p><p>&ldquo;We wanted to aggregate links to these useful resources and make them easily available to anyone with the app,&rdquo; Schneider said.&nbsp;</p><p>The third part of the app provides information on Covid-19 cases reported to <a href="http://health.gatech.edu/">Stamps Health Services</a> to help them assess the status of the pandemic. &ldquo;It gives members of the community a pulse on positive cases reported on campus,&rdquo; he said. &ldquo;This should help remind students of the need to get tested regularly.&rdquo;</p><p>COVID Central is a web-based app that runs in any web browser. It was designed with a single column of information to be useful on a smartphone screen, through Safari or Chrome &ndash; browsers installed on iOS and Android phones. Because it is web-based, there&rsquo;s no need to obtain it from a manufacturer&rsquo;s app store.</p><p>Being web-based makes COVID Central easier to update with new resources or improved programming without having to push out an app update. &ldquo;Every time someone visits the site, the latest information is pulled down from the server,&rdquo; Schneider said.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1598492078</created>  <gmt_created>2020-08-27 01:34:38</gmt_created>  <changed>1598492299</changed>  <gmt_changed>2020-08-27 01:38:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[COVID Central is a web app designed to help the Tech community check for Covid-19 symptoms and access key resources.]]></teaser>  <type>news</type>  <sentence><![CDATA[COVID Central is a web app designed to help the Tech community check for Covid-19 symptoms and access key resources.]]></sentence>  <summary><![CDATA[<p>Georgia Tech has launched a new web app to help students, faculty, and staff check for symptoms of Covid-19, access links to important campus coronavirus resources &ndash; including the NOVID exposure app &ndash; and track infection reports in the campus community. The web-based app, known as COVID Central, can be accessed from computers, tablets, and smartphones.</p>]]></summary>  <dateline>2020-08-26T00:00:00-04:00</dateline>  <iso_dateline>2020-08-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-08-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>638474</item>          <item>638476</item>          <item>638475</item>      </media>  <hg_media>          <item>          <nid>638474</nid>          <type>image</type>          <title><![CDATA[COVID Central App]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[covid-central-screen-horiz.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/covid-central-screen-horiz.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/covid-central-screen-horiz.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/covid-central-screen-horiz.jpg?itok=rNwXMgo7]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[COVID Central home screen]]></image_alt>                    <created>1598491305</created>          <gmt_created>2020-08-27 01:21:45</gmt_created>          <changed>1598491305</changed>          <gmt_changed>2020-08-27 01:21:45</gmt_changed>      </item>          <item>          <nid>638476</nid>          <type>image</type>          <title><![CDATA[COVID Central brings together Covid-19 resources]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Facial Coverings010-lg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Facial%20Coverings010-lg.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Facial%20Coverings010-lg.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Facial%2520Coverings010-lg.jpg?itok=j9ijiIri]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Image of students walking on campus]]></image_alt>                    <created>1598491516</created>          <gmt_created>2020-08-27 01:25:16</gmt_created>          <changed>1598491516</changed>          <gmt_changed>2020-08-27 01:25:16</gmt_changed>      </item>          <item>          <nid>638475</nid>          <type>image</type>          <title><![CDATA[COVID Central App full page]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[covid-central-screen.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/covid-central-screen.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/covid-central-screen.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/covid-central-screen.jpg?itok=wJ2PL-hQ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[COVID Central full screen]]></image_alt>                    <created>1598491390</created>          <gmt_created>2020-08-27 01:23:10</gmt_created>          <changed>1598491390</changed>          <gmt_changed>2020-08-27 01:23:10</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="184289"><![CDATA[covid-19]]></keyword>          <keyword tid="169552"><![CDATA[symptoms]]></keyword>          <keyword tid="185579"><![CDATA[NOVID]]></keyword>          <keyword tid="398"><![CDATA[health]]></keyword>          <keyword tid="183843"><![CDATA[coronavirus]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="637497">  <title><![CDATA[Baking and Boiling Botnets Could Drive Energy Market Swings and Damage]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Evil armies of internet-connected EV chargers, ovens, hot-water heaters, air-conditioners, and other high-wattage appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings and creating financial damage to deregulated energy markets, warns a new report scheduled to be presented Aug. 5 at the Black Hat USA 2020 conference.</p><p>By turning the compromised equipment on or off to artificially increase or decrease power demand, botnets made up of these energy-consuming devices might help an unscrupulous energy supplier or retailer (electric utility) alter prices to create a business advantage, or give a nation-state a way to remotely harm the economy of another country by causing financial damage to its electricity market. If done within the bounds of normal power demand variation, such an attack would be difficult to detect, the researchers said.</p><p>&ldquo;If an attacker can slightly affect electricity market prices in their favor, it would be like knowing today what&rsquo;s going to happen in tomorrow&rsquo;s stock market,&rdquo; said Tohid Shekari, a graduate research assistant in the <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. &ldquo;If the manipulation stays within a certain range, it would be stealthy and difficult to differentiate from a typical load forecasting error.&rdquo;</p><p>Believed to be the first proposed energy market manipulation cyberattack, the operation would depend on botnets composed of thousands of appliances that could be controlled centrally by attackers who had taken over their Internet of Things (IoT) controllers. Malicious actors have already demonstrated IoT botnet attacks such as Mirai, which used a network of compromised internet-connected cameras and routers to launch attacks on key internet infrastructure.</p><p>The attack, dubbed &ldquo;IoT Skimmer,&rdquo; would be made possible by the deregulation of energy markets, which has created a system to efficiently supply electrical power. To meet the demand for electrical energy, utility companies must predict future demand and purchase power from the day-ahead wholesale energy market at competitive prices. If the predictions turn out to be wrong, the utilities may have to pay more or less for the energy they need to meet the demands of their customers by participating in the real-time market, which has more volatile prices in general. Creating erroneous demand data to manipulate forecasts could be profitable to the suppliers selling energy to meet the unexpected demand, or the retailers or utilities buying cheaper energy from the real-time market.</p><p>The researchers weren&rsquo;t able to determine whether such an attack might have already taken place because IoT devices &ndash; beyond being insecure &ndash; also lack the kind of monitoring that would be necessary to detect such hijacking. But they used real data sets from two of the largest U.S. energy markets &ndash; New York and California &ndash; to evaluate the feasibility of their proposed attack.</p><p>&ldquo;We did a lot of simulation and mathematical analysis to show that this kind of transfer could occur,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/raheem-a-beyah">Raheem Beyah</a>, the Motorola Foundation Professor in the School of Electrical and Computer Engineering who is also Georgia Tech&rsquo;s vice president for Interdisciplinary Research and co-founder of the company Fortiphyd Logic. &ldquo;We also did a feasibility analysis of the supporting areas to show that this would be possible from various perspectives.&rdquo;</p><p>The researchers assume that such botnets already exist, and that attackers could simply rent their use on the dark web. More than 20 million smart thermostats already exist in the North American market, and they are connected to at least one high-wattage device &ndash; a heating and air-conditioning system that could be controlled by attackers on an intermittent basis.</p><p>&ldquo;If you consider all of the smart thermostats and internet-connected electric ovens, water heaters, and electric vehicle chargers that are already in use, there are plenty of devices to be compromised,&rdquo; Shekari said. &ldquo;Homeowners would likely never notice if the EV charger turns on when electricity demand is highest, or if the air conditioning cools a little more than they expected when they are not home.&rdquo;</p><p>To counter the potential attack, researchers suggest both detection and prevention steps. Through integrated monitoring of the normal power use of high-wattage IoT-connected devices, unexpected peaks or valleys in power consumption triggered by an attacker could be detected. And access to data on expected energy demand &ndash; which is now made available publicly &ndash; could be restricted to those who actually need it.</p><p>The primary factor that makes this attack possible is the detailed online data sharing of electricity market information, which is usually updated every five minutes.&nbsp;</p><p>&ldquo;This energy demand information is really a data privacy issue, and we need to think long and hard about the balance between transparency and security,&rdquo; Beyah said. &ldquo;There&rsquo;s always a tension there, but limiting the amount of detail could make it more difficult for attackers who want to hide their manipulations to know what the normal variations are.&rdquo;</p><p>The potential attack highlights the need for considering cybersecurity threats in technology areas where they had perhaps never been possible before.&nbsp;&nbsp;</p><p>&ldquo;This is an interesting intersection between the IoT security world and energy markets,&rdquo; said Beyah. &ldquo;Right now, it seems that there is a large gap between the two worlds. Our point is that there are implications for combining IoT technology and high-wattage devices that can compromise markets in ways we would never have thought of before.&rdquo;</p><p>The presentation, &ldquo;IoT Skimmer: Energy Market Manipulation Through High-Wattage IoT Botnets,&rdquo; will be presented on Wednesday, Aug. 5, at 2:30 p.m. as part of the Black Hat USA 2020 conference.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1596550697</created>  <gmt_created>2020-08-04 14:18:17</gmt_created>  <changed>1596550911</changed>  <gmt_changed>2020-08-04 14:21:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Evil armies of internet-connected appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings.]]></teaser>  <type>news</type>  <sentence><![CDATA[Evil armies of internet-connected appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings.]]></sentence>  <summary><![CDATA[<p>Evil armies of internet-connected EV chargers, ovens, hot-water heaters, air-conditioners, and other high-wattage appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings and creating financial damage to deregulated energy markets, warns a new report scheduled to be presented Aug. 5 at the Black Hat USA 2020 conference.</p>]]></summary>  <dateline>2020-08-04T00:00:00-04:00</dateline>  <iso_dateline>2020-08-04T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-08-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>637494</item>          <item>637495</item>      </media>  <hg_media>          <item>          <nid>637494</nid>          <type>image</type>          <title><![CDATA[Hijacked oven]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[oven.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/oven.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/oven.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/oven.jpg?itok=bnywFOMt]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Oven with open door]]></image_alt>                    <created>1596550050</created>          <gmt_created>2020-08-04 14:07:30</gmt_created>          <changed>1596550188</changed>          <gmt_changed>2020-08-04 14:09:48</gmt_changed>      </item>          <item>          <nid>637495</nid>          <type>image</type>          <title><![CDATA[Electric substation]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[substation.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/substation.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/substation.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/substation.jpg?itok=yAsdnmbq]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Electrical substation]]></image_alt>                    <created>1596550128</created>          <gmt_created>2020-08-04 14:08:48</gmt_created>          <changed>1596550169</changed>          <gmt_changed>2020-08-04 14:09:29</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>      </news_terms>  <keywords>          <keyword tid="185457"><![CDATA[botnet]]></keyword>          <keyword tid="213"><![CDATA[energy]]></keyword>          <keyword tid="185458"><![CDATA[energy markets]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="175687"><![CDATA[black hat]]></keyword>          <keyword tid="185459"><![CDATA[IoT Skimmer]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="637138">  <title><![CDATA[COVID-19 Info Dashboards Come to the CDC With Georgia Tech Help]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The maelstrom of a pandemic can generate messy data, especially in the beginning. But new dashboards at the Centers for Disease Control and Prevention (CDC) are sorting public health data to make it more productive, with the help of researchers from the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI).</p><p><a href="https://www.cdc.gov/covid-data-tracker/index.html#mobility">One of the dashboards</a> was recently made accessible to the public.</p><p>&ldquo;The main value of that dashboard is tracking the relationship between human mobility &ndash; whether it&rsquo;s people going to stores or for entertainment or to workplaces &ndash; and the COVID-19 case counts and death counts,&rdquo; said Jason Poovey, head of the High-Performance Computing and Data Analytics branch at GTRI.</p><p>The dashboard&rsquo;s main pane displays total numbers of confirmed infections and deaths for the nation and also breaks them down for individual states and counties. On other pages, graphs trace people&rsquo;s presence at places such as shopping malls, restaurants, and transit stations &ndash; using data from Google and other sources &ndash; and display this together with graphs of COVID-19 data. On another page, trend lines for infection and death rates appear alongside trends for coronavirus testing.</p><p>&ldquo;Understanding the timing and potential impact of stay-at-home or shelter-in-place policies on human mobility and COVID-19 transmission patterns can assist state and local public health partners in modifying these orders over the course of the COVID-19 pandemic,&rdquo; said Macarena Garcia, CDC&rsquo;s chief data scientist for the CDC COVID-19 Response. &ldquo;In addition, dashboards increase the understanding of when and how to fully implement these strategies in future outbreaks where community mitigation may be required.&rdquo;&nbsp;</p><p><strong>Internal dashboards</strong></p><p>In addition, COVID-19 responders and researchers at the CDC are using about a dozen internally facing dashboards built by the GTRI team to move data from CDC reports and presentations to a visualization platform. This allows the team to regularly update the data and make it widely accessible. Each dashboard is tailored to individual task force needs.</p><p>&ldquo;There are different aspects to the COVID-19 response and each group is handling a different part of it, so they each have different needs. One group might be cross-referencing data with outbreak hotspots. Another group may want to track mobility versus new infections by segments of the population,&rdquo; Poovey said.</p><p>&ldquo;Some groups are directly doing COVID-19 response on the ground; others are doing studies using existing data, and we support both sides,&rdquo; said Charity Hilton, a health data analytics research scientist at GTRI and lead of the COVID-19 task group with the CDC. &ldquo;We will also be working with the CDC&rsquo;s international task force on COVID-19 to help them collect and analyze global data.&rdquo;</p><p>&ldquo;We have worked closely with GTRI on the design and operationalization of data analytic tools and products to inform CDC response activities across many task forces,&rdquo; said CDC&rsquo;s Garcia. &ldquo;Our focused collaboration with GTRI on meeting emerging analytic needs across the response has resulted in quicker and more efficient tracking of localized outbreaks in the United States.&rdquo;&nbsp;</p><p><strong>COVID-19 pivot</strong></p><p>When COVID-19 hit, GTRI engineers were already in place due to other collaborations with the CDC.</p><p>&ldquo;We have had a series of projects with CDC since October 2019 to get health data into useful platforms. We were able to pivot very quickly to COVID-19 work,&rdquo; said Jon Duke, a medical doctor and health informatics expert who leads the Center for Health Analytics and Informatics at GTRI.</p><p>The COVID-19 case and testing data are taken mainly from USAfacts.org, a public information outlet that publishes data compiled by government agencies. Testing and case numbers are updated on the public-facing CDC COVID-19 dashboard every day.</p><p>Data on how people move about in their daily lives comes from various anonymized mobile phone sources. They include Google mobility reports at the county level, anonymous GPS data from mobile carriers, and a mobile data service called Cuebiq Mobility, which provides median distances cell phone users travel over time.</p><p><strong>Distancing data</strong></p><p>The group will create more custom dashboards to meet CDC COVID-19 groups&rsquo; needs and expand many of the existing dashboards, including the public one.</p><p>&ldquo;We just added news report scouring, so the public can get a daily list of news from hotspot counties, and people can see corresponding reports of outbreaks maybe at a meatpacking plant or in a nursing home. Or they can see where there has been a boost in testing,&rdquo; Hilton said.</p><p>The public dashboard also provides easy access to data that is usually harder to find, such as local stay-at-home orders, travel restrictions, and public health laws. The GTRI team is also working to help Georgia Tech pandemic researchers who are modeling the development of COVID-19 in the state of Georgia by organizing data reflecting the population&rsquo;s degree of adherence to social distancing.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: Ben Brumfield</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1595359268</created>  <gmt_created>2020-07-21 19:21:08</gmt_created>  <changed>1595359410</changed>  <gmt_changed>2020-07-21 19:23:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[New dashboards at the Centers for Disease Control and Prevention (CDC) are sorting public health data to make it more productive, with the help of researchers from the Georgia Tech Research Institute (GTRI).]]></teaser>  <type>news</type>  <sentence><![CDATA[New dashboards at the Centers for Disease Control and Prevention (CDC) are sorting public health data to make it more productive, with the help of researchers from the Georgia Tech Research Institute (GTRI).]]></sentence>  <summary><![CDATA[<p>The maelstrom of a pandemic can generate messy data, especially in the beginning. But new dashboards at the Centers for Disease Control and Prevention (CDC) are sorting public health data to make it more productive, with the help of researchers from the Georgia Tech Research Institute (GTRI).</p>]]></summary>  <dateline>2020-07-21T00:00:00-04:00</dateline>  <iso_dateline>2020-07-21T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-07-21 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>637135</item>          <item>637136</item>      </media>  <hg_media>          <item>          <nid>637135</nid>          <type>image</type>          <title><![CDATA[Coronavirus image]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[coronavirus-23354.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/coronavirus-23354.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/coronavirus-23354.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/coronavirus-23354.jpg?itok=xPVFP8rg]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Microscope image of coronavirus]]></image_alt>                    <created>1595358583</created>          <gmt_created>2020-07-21 19:09:43</gmt_created>          <changed>1595358583</changed>          <gmt_changed>2020-07-21 19:09:43</gmt_changed>      </item>          <item>          <nid>637136</nid>          <type>image</type>          <title><![CDATA[Dashboard developed for CDC]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cdc-dashboard.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cdc-dashboard.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cdc-dashboard.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cdc-dashboard.png?itok=X29v6nKf]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[CDC data dashboard]]></image_alt>                    <created>1595358706</created>          <gmt_created>2020-07-21 19:11:46</gmt_created>          <changed>1595358706</changed>          <gmt_changed>2020-07-21 19:11:46</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="123"><![CDATA[CDC]]></keyword>          <keyword tid="438"><![CDATA[data]]></keyword>          <keyword tid="184289"><![CDATA[covid-19]]></keyword>          <keyword tid="729"><![CDATA[pandemic]]></keyword>          <keyword tid="1482"><![CDATA[mobility]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="634615">  <title><![CDATA[Interactive Tool Helps People See Why Staying Home Matters During a Pandemic]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Social distancing has become one of the most impactful strategies in the battle to contain the spread of COVID-19, and a new interactive modeling tool can help people understand why it is so important to &ldquo;flatten the curve.&rdquo; Known as VERA, the artificial intelligence (AI) application was developed by researchers at the Georgia Institute of Technology to raise awareness about why it matters that individuals distance themselves during an infectious disease outbreak.&nbsp;</p><p>Led by College of Computing faculty members Ashok Goel and Spencer Rugaber, and Design &amp; Intelligence Laboratory graduate researchers William Broniec and Sungeun An, the VERA Epidemiology project uses AI techniques to empower users to build their own visual models that simulate the impact of social distancing. The project evolved from earlier National Science Foundation-supported research on a virtual ecological research assistant that enables researchers to explore &ldquo;what if&rdquo; experiments about complex ecological phenomena.</p><p>The beauty of VERA is that users do not need a background in complex mathematical equations or computer programming to explore it. A high school student interested in finding out what it looks like to &ldquo;flatten the curve&rdquo; can log in to VERA and investigate. A parent handling middle school science lessons from home can log in to VERA and demonstrate the reason that it is important that they do lessons from home during the COVID-19 outbreak.&nbsp;</p><p>For example, a user can input 16 people as the &ldquo;average contacts per day per person&rdquo; and see a simulation of the possible outcomes. Then, the user can lower the number of &ldquo;average contacts per day per person&rdquo; to 12, a reduction in social contact but not a substantial one. Upon running the simulation again, users see a marked difference in &ldquo;peak cases&rdquo; of 7,000 rather than 8,000, and healthcare capacity being exceeded after 20 days, rather than the original 15. Users can continue to adjust these numbers to see the impact of social distancing transform possible health outcomes before their eyes.&nbsp;</p><p>&ldquo;Think of VERA as a virtual laboratory that anyone can use,&rdquo; said Ashok Goel, a professor in the School of Interactive Computing and the chief scientist for Georgia Tech&rsquo;s Center for 21st Century Universities. &ldquo;The user can jump into our program and conduct &lsquo;what if&rsquo; experiments by adjusting simulation parameters. We see education as an essential component of &lsquo;flattening the curve&rsquo; and this is our way of providing an accessible and informal learning tool that can educate citizens about social distancing data.&rdquo;&nbsp;&nbsp;</p><p>A key component of Georgia Tech&rsquo;s strategic vision for the future of education is an &ldquo;inclusive and impactful education that serves the public good.&rdquo; Tools like VERA provide inclusive resources that help the global community gain a greater understanding of the real-world impact of our actions during a crisis like COVID-19.&nbsp;</p><p>Are you interested in trying VERA? Anyone can create an account through <a href="http://epi.vera.cc.gatech.edu">epi.vera.cc.gatech.edu</a>&nbsp;</p><p>The VERA project website also includes a brief user guide as well as a step-by-step tutorial about VERA. They are available at&nbsp; <a href="http://epi.vera.cc.gatech.edu/docs/exercise">http://epi.vera.cc.gatech.edu/docs/exercise</a></p><p>You can also read the new white paper about this work, &ldquo;Using VERA to explain the impact of social distancing on the spread of COVID-19,&rdquo; on the VERA website.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: Brittany Aiello</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1587498355</created>  <gmt_created>2020-04-21 19:45:55</gmt_created>  <changed>1587498413</changed>  <gmt_changed>2020-04-21 19:46:53</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new interactive modeling tool can help people understand why social distancing is so important.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new interactive modeling tool can help people understand why social distancing is so important.]]></sentence>  <summary><![CDATA[<p>Social distancing has become one of the most impactful strategies in the battle to contain the spread of COVID-19, and a new interactive modeling tool can help people understand why it is so important to &ldquo;flatten the curve.&rdquo;&nbsp;</p>]]></summary>  <dateline>2020-04-21T00:00:00-04:00</dateline>  <iso_dateline>2020-04-21T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-04-21 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>634613</item>          <item>634614</item>      </media>  <hg_media>          <item>          <nid>634613</nid>          <type>image</type>          <title><![CDATA[Chart Shows Impact of Distancing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[VAL12.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/VAL12.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/VAL12.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/VAL12.png?itok=h0mk-fci]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Chart for VERA's epidemiology application]]></image_alt>                    <created>1587496904</created>          <gmt_created>2020-04-21 19:21:44</gmt_created>          <changed>1587496904</changed>          <gmt_changed>2020-04-21 19:21:44</gmt_changed>      </item>          <item>          <nid>634614</nid>          <type>image</type>          <title><![CDATA[Importance of Social Distancing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GettyImages-1215988312-medium.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/GettyImages-1215988312-medium.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/GettyImages-1215988312-medium.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/GettyImages-1215988312-medium.jpg?itok=ixtfSc_E]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Social distancing graphic]]></image_alt>                    <created>1587497122</created>          <gmt_created>2020-04-21 19:25:22</gmt_created>          <changed>1587497122</changed>          <gmt_changed>2020-04-21 19:25:22</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="729"><![CDATA[pandemic]]></keyword>          <keyword tid="184289"><![CDATA[covid-19]]></keyword>          <keyword tid="182669"><![CDATA[VERA]]></keyword>          <keyword tid="11138"><![CDATA[Epidemiology]]></keyword>          <keyword tid="112431"><![CDATA[ashok goel]]></keyword>          <keyword tid="2835"><![CDATA[ai]]></keyword>          <keyword tid="184284"><![CDATA[GTCOVID]]></keyword>          <keyword tid="184588"><![CDATA[interactive tool]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="634366">  <title><![CDATA[Will Smartphones Help Us Keep COVID-19 Under Control?]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The smartphones carried in so many pockets and purses could play a key role in keeping COVID-19 under control as the nation cautiously reopens the economy.</p><p>That goal received support April 10 with an announcement by Google and Apple that they are collaborating on standards and tools to make it easier for software developers to build apps that can help fight the pandemic.&nbsp;</p><p>For the past month, a team of researchers at the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI) has been working with a community-driven open source project on a &ldquo;privacy first&rdquo; open-source app that can take advantage of these tools to do something known as &ldquo;contact tracing.&rdquo; Contact tracing software, running on smartphones of persons who&rsquo;ve chosen to participate, records the kind of person-to-person interactions that have the potential for transmitting contagious illnesses. If any of the other participants the user has interacted with becomes ill and chooses to share information about their symptoms, the software then alerts the impacted user anonymously. During this process, all shared information remains completely anonymous &ndash; to other users, to the government, to technology companies, and even to the database that makes the exposure matching possible.&nbsp;</p><p>Individuals notified of a potential exposure could then receive information and guidance about steps they might take, including suggestions to get tested for COVID-19, to self-quarantine, or to closely monitor for symptoms. The notification would be one part of a larger effort to control virus clusters before they become outbreaks. To be most successful, a software-based contact tracing system will have to be coupled with broad-based testing able to quickly determine who&rsquo;s infected with the virus.</p><p>Similar approaches have proven effective in countries such as Singapore and South Korea, though these systems have weaker privacy guarantees in place. A key feature of this new approach is that it would not exchange or publish any personally identifiable information and does not disclose any information at all unless someone voluntarily chooses to share their symptoms or diagnosis. This approach accomplishes this using Bluetooth signal strength to assess proximity rather than GPS data, which is difficult to anonymize and could be used to identify individual users based on frequently visited locations.</p><p>&ldquo;We really need a better early warning network to guard against the re-emergence of COVID-19 in the general population,&rdquo; said J. True Merrill, a GTRI senior research scientist who is working on the project. &ldquo;In the early part of this outbreak, COVID-19 was spreading easily across the United States without an early warning of it. After the current shelter-in-place period is over, we are going to need tools to help people determine when they need to self-quarantine in order to stop outbreaks before they can grow.&rdquo;</p><p>Manual contact tracing to identify who&rsquo;s been infected has long been part of public health strategies to contain serious communicable diseases, but the speed at which COVID-19 has spread outpaced traditional methods, said Alexa Harter, director of GTRI&rsquo;s Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory.</p><p><strong>Privacy First, for the Common Good</strong></p><p>&ldquo;Smartphone contact tracing is a way of using technology to automate and augment some of the techniques that public health agencies have used,&rdquo; she said. &ldquo;Technology can enable us to do this, but for people in the United States to adopt it, privacy will really have to be locked down. Everything we&rsquo;re doing in this project aims at providing privacy first. Manual contact tracing is still critically important, but digital contact tracing and alerting can significantly assist these efforts.&rdquo;&nbsp;</p><p>Beyond protecting privacy, large-scale adoption of smartphone contact tracing will need a social component that appeals to supporting the common good.</p><p>&ldquo;To be successful, we&rsquo;ll need to turn participation in this into a socially good thing, perhaps like the Ice Bucket Challenge,&rdquo; Merrill said. &ldquo;We&rsquo;ll need people to voluntarily opt-in, and to get that, users would need to have full knowledge and control over where their data is stored and with whom they choose to share it.&rdquo;</p><p><strong>An Open-Source Global Effort</strong></p><p>GTRI researchers are working with an open source community-driven project known as CoEpi (which stands for Community Epidemiology in Action), which envisions an app of the same name that could be installed on phones running Apple&rsquo;s iOS or Google&rsquo;s Android systems. CoEpi focuses on anonymous symptom sharing and alerting to stop the spread of transmissible illnesses like COVID-19.&nbsp;</p><p>Other organizations are also working on contact tracing apps, and these organizations have recently joined together to form the TCN Coalition to support privacy-preserving digital contact tracing protocols to flatten the curve and stop the spread of COVID-19 while reopening the economy. TCN, the core component of the effort, stands for &ldquo;temporary contact number,&rdquo; which is an anonymous number generated to privately record interactions between mobile devices without allowing the devices themselves (or their users) to be tracked.</p><p>The TCN Coalition developed a common, shared protocol so that all of the different apps in the entire digital contact tracing network can cross-communicate, no matter which app is used. The TCN Coalition also developed a &quot;Digital Contact Tracing Bill of Rights&quot; that outlines requirements to minimize data collection, restricts what can be done with the collected data, and establishes security guidelines to protect civil liberties.&nbsp;&nbsp;</p><p><strong>The Path Forward, Group Benefits</strong></p><p>&ldquo;A symptom-sharing app such as CoEpi would allow us to relax stay-at-home orders so that we can increasingly return to work and public spaces, while providing a way for individuals to get early alerts about potential exposures to symptoms,&rdquo; said Dana Lewis, one of the founders of CoEpi. &ldquo;CoEpi can provide early detection of exposure risks for individuals, and an early warning system for the communities they interact in to detect and slow the transmission of illness like COVID-19, influenza, and even the common cold.&rdquo;</p><p>Convincing a hundred million U.S. citizens to install a new app on their phones could be a significant challenge, but the CoEpi focus on symptom sharing and alerting could yield benefits to smaller groups even before being widely adopted.</p><p>&ldquo;The good thing about this is that it could help protect small groups without needing the buy-in of the whole population,&rdquo; said Harter. &ldquo;An example would be a retirement community that is largely self-contained. If someone there got sick, it would be important to alert everybody that person had interacted with so they could self-quarantine and protect other people in the community.&rdquo;</p><p>Other groups might include organizations performing critical services, such as factories, warehouses, or package delivery companies. &ldquo;If you had a group where people really needed to work together, you could get early alerts to stop outbreaks from happening,&rdquo; she said. It could also be used among small clusters of high-risk individuals and their family and friends, or at universities and schools as they emerge from self-isolation.</p><p><strong>How Contact Tracing Would Work</strong></p><p>The contact tracing component of the system would work something like this.</p><p>Each user opting into the service would install an app that would generate personal keys &ndash; long strings of letters and numbers unique to that specific smartphone, which are in turn used to generate randomized temporary contact numbers. The phones of users opting in would then communicate those temporary numbers with each other when they were nearby, using low-energy Bluetooth, a short-distance protocol widely used on mobile devices. Signal strength could provide a measure of how close the phones are to assess the risk of virus transmission when those people crossed paths.</p><p>&ldquo;The idea is to log close interactions,&rdquo; said Michael Brown, a GTRI research scientist who is the Georgia Tech technical lead of the project. &ldquo;We&rsquo;ll want to eliminate as many false positives as possible. For example, it&rsquo;s highly unlikely that person-to-person transmission would occur across a large room.&rdquo; For each interaction, the system could also record the duration of proximity, another factor in assessing potential risk.</p><p>Each phone would periodically generate new anonymous unique keys, and use those to generate new temporary contact numbers each time it crossed paths with another phone running similar apps. It would record those keys in a database that would be kept on the phone for a short period of time determined by the incubation period of the virus.&nbsp;</p><p>If a CoEpi user developed symptoms, they would share their symptoms in their app. In future versions, the CoEpi developers envision that the sick user would be presented with a series of options such as anonymously notifying public health authorities. For now, the symptoms are sent to the CoEpi system, which would add the anonymous key and symptom report from the sick user&rsquo;s phone.&nbsp;</p><p>Each user&rsquo;s phone would periodically download the list of keys associated with known symptom reports and check the temporary numbers generated by those keys against those of the phones it had been near. A match between each phone&rsquo;s database and the numbers generated from the server&rsquo;s key list would generate a notification of the exposure, and the app would then help the user decide whether the match likely represented a real exposure, and if so, decide what to do: self-quarantine, be tested, and/or notify public health authorities.</p><p>&ldquo;Everyone would be pinged when they get tied to a known case, but only over a time range that really could have created a risk of transmission,&rdquo; Merrill said. &ldquo;There would be no identification information exchanged between the phones or the phones and the server.&rdquo;</p><p><strong>Other Potential Epidemiological Uses</strong></p><p>Beyond advice on illness and notification of potential contacts, the system could also generate anonymized epidemiological information useful to researchers tracking pandemics. Users of the system would decide if they want to opt into the database and share their anonymized information with public health authorities.</p><p>&ldquo;The CoEpi project will help provide earlier detection and testing of potential cases, and that information would be helpful for our predictive models,&rdquo; said Pinar Keskinocak, who is William W. George Chair and Professor in Georgia Tech&rsquo;s H. Milton Stewart School of Industrial and Systems Engineering.</p><p>Beyond programming support, GTRI will assist the effort through security analysis and potentially testing in its Atlanta facilities, Brown said. The testing will need to include many different environments and handset types, including multiple variations in operating systems.</p><p>The GTRI researchers have been racing to help CoEpi roll out software for beta and on-site testing, which should occur over the next several weeks. &ldquo;The time line for this is super aggressive,&rdquo; Harter said. &ldquo;There is an urgency to this because we know it will be very useful in helping people stop social distancing, return to work and school, and try to get back to a more normal life.&rdquo;</p><p>If you&#39;re interested in helping CoEpi as a mobile developer who can help at #WeAreNotWaiting speed (e.g. today or this week), please reach out to CoEpi: <a href="https://forms.gle/MLeKz9nerPvX8fwC8">https://forms.gle/MLeKz9nerPvX8fwC8</a>&nbsp;</p><p>Similarly, individuals who are interested in becoming early testers of CoEpi can sign up via the same form: <a href="https://forms.gle/MLeKz9nerPvX8fwC8">https://forms.gle/MLeKz9nerPvX8fwC8</a>.&nbsp;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1586891488</created>  <gmt_created>2020-04-14 19:11:28</gmt_created>  <changed>1586891571</changed>  <gmt_changed>2020-04-14 19:12:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Smartphones could provide a critical service of automating contact tracing to control future COVID-19 outbreaks.]]></teaser>  <type>news</type>  <sentence><![CDATA[Smartphones could provide a critical service of automating contact tracing to control future COVID-19 outbreaks.]]></sentence>  <summary><![CDATA[<p>Automated contact tracing using smartphone apps could help control future COVID-19 outbreaks by allowing rapid notification of people who may have been exposed to the coronavirus.&nbsp;</p>]]></summary>  <dateline>2020-04-14T00:00:00-04:00</dateline>  <iso_dateline>2020-04-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-04-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>634363</item>          <item>634364</item>      </media>  <hg_media>          <item>          <nid>634363</nid>          <type>image</type>          <title><![CDATA[New Smartphone App Will Record Interactions]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[EDIT 13C2310-P2-116 crop.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/EDIT%2013C2310-P2-116%20crop.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/EDIT%2013C2310-P2-116%20crop.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/EDIT%252013C2310-P2-116%2520crop.jpg?itok=FhI8FRux]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[People walking on a sidewalk]]></image_alt>                    <created>1586890647</created>          <gmt_created>2020-04-14 18:57:27</gmt_created>          <changed>1586890647</changed>          <gmt_changed>2020-04-14 18:57:27</gmt_changed>      </item>          <item>          <nid>634364</nid>          <type>image</type>          <title><![CDATA[New Smartphone App Will Record Interactions - 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[green-crowd.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/green-crowd.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/green-crowd.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/green-crowd.jpg?itok=OxiMXKwJ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Crowd of students on campus]]></image_alt>                    <created>1586890775</created>          <gmt_created>2020-04-14 18:59:35</gmt_created>          <changed>1586890775</changed>          <gmt_changed>2020-04-14 18:59:35</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="168908"><![CDATA[smartphone]]></keyword>          <keyword tid="184289"><![CDATA[covid-19]]></keyword>          <keyword tid="729"><![CDATA[pandemic]]></keyword>          <keyword tid="184478"><![CDATA[contact tracing]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="634001">  <title><![CDATA[Cognitive Empowerment Program Opens Doors to First Members  ]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Stepping off of the elevator on the first floor at 6 Executive Park in Atlanta, the first thing you notice about the space is its serenity. It&rsquo;s light-filled, with lots of plants, a flowing water feature, and a neutral color palette &ndash; shades of soft blue, grey, beige, and sage green. It&rsquo;s relaxed and welcoming, and that&rsquo;s by design.&nbsp;</p><p>The center, which opened in January, is the home of the Cognitive Empowerment Program, a joint effort between Emory University&rsquo;s Brain Health Center and the Georgia Institute of Technology to empower people living with mild cognitive impairment (MCI), a distinct decline in thinking. The condition is often a precursor of Alzheimer&rsquo;s disease and impacts up to 20% of Americans over age 64, an age group that&rsquo;s expected to double by the year 2050.</p><p>Twice a week, people with MCI (called program members) and their care partners, usually spouses or adult children, visit Executive Park to participate in art and nutrition classes, physical therapy, gentle yoga, and brain exercises. There&rsquo;s also a &ldquo;tech bar&rdquo; for help operating or troubleshooting mobile devices. The goal is to empower participants to take charge of their lives through education and independent living. Dr. Allan Levey, director of the Emory University Alzheimer&rsquo;s Disease Research Center, says members and care partners have already praised the program.&nbsp;</p><p>&ldquo;By design, program benefits are wide-ranging and personalized, providing individuals with tools to take control over risk factors and behaviors that we hope will promote their cognition, emotional, physical, and spiritual well-being,&rdquo; said Levey, who is also professor and chairman of Emory&rsquo;s Department of Neurology. &ldquo;The program also provides hope and the personal reward that they are contributing to the fight against Alzheimer&rsquo;s disease.&rdquo;</p><p>Steve Baltz and his wife Lyn Reagan started the year-long program in January with the inaugural group. Baltz had a stroke in 2003, which affected &ldquo;the memory part of his brain,&rdquo; Reagan said. He recovered and continued working for the next 10 years. After retiring, Baltz became less active and more isolated at home. Then, his memory began to decline. He forgets whether he fed the dog and misplaces things.</p><p>Reagan says she and her husband are &ldquo;incredibly grateful&rdquo; for the program; it helps him to get out of the house and socialize. &ldquo;He loves it. He just can&rsquo;t wait to go.&rdquo;</p><p>Baltz, a retired physician, believes &ldquo;this is an opportunity for us to give back [to the medical and research communities] because we&rsquo;re right here at the forefront of MCI research.&rdquo;</p><p>As members of the first group of participants, the Atlanta couple now serve as mentors to newer members and their care partners &ndash; couples like Fred and Marsha Rueff, who joined the program in February.</p><p>Doctors diagnosed Fred with MCI six years ago, and over the past year, his memory has worsened. He has trouble with language and remembering names but is still excellent at problem-solving and math.&nbsp;</p><p>&ldquo;Fred&rsquo;s great to take when you&rsquo;re shopping sales because he can figure out the percentage off,&rdquo; Marsha said.&nbsp;</p><p>Activities at the Cognitive Empowerment Program help to keep Fred&rsquo;s brain sharp. He enjoys yoga classes and maintains a daily journal of his activities. &ldquo;This program has given us a whole new level of hope.&rdquo;</p><p><strong>Unique Research Opportunity</strong></p><p>While the Cognitive Empowerment Program serves as therapy for members, it&rsquo;s also a living laboratory, providing a unique research opportunity for Georgia Tech and Emory.&nbsp;</p><p>The program&rsquo;s innovation accelerator, led by Georgia Tech&rsquo;s Jennifer DuBose, advances research by breaking down barriers to collaboration. Researchers and students, some supported by <a href="http://ipat.gatech.edu/cognitive-empowerment-program-announces-inaugural-seed-grant-recipients">annual seed grants</a>, work in the heart of the Executive Park space where they can easily observe and interact with program members.&nbsp;</p><p>&ldquo;They can watch while people are having physical therapy and yoga and see them hanging out on the sofas. I didn&rsquo;t want people to have a one-off experience with the members,&rdquo; said DuBose, a principal research associate in the <a href="https://design.gatech.edu/">College of Design</a> and associate director of <a href="http://simtigrate.gatech.edu/">SimTigrate Design Lab</a>.&nbsp;</p><p>DuBose often has lunch at the center with program participants and leads sessions where she works one-on-one with them. During one recent session, members placed emoticon stickers on printed &ldquo;journey maps&rdquo; from their homes to the center to express how their feelings changed over the course of the day. It&rsquo;s a simple and effective way for researchers to learn about members&rsquo; anxieties, routines, and limitations related to memory loss.</p><p>Craig Zimring, a professor in the School of Architecture and director of SimTigrate Design Lab, is directing the program&rsquo;s built environment core, researching how design can improve cognition, mood, and functioning for people with MCI. His team worked alongside the Executive Park center&rsquo;s architect to inform the space design and will develop solutions for other therapeutic and home settings.</p><p>Zimring also leads talks at the center on topics like how sound and light affects mood and sleep patterns. He shows how the facility&rsquo;s advanced lighting system automatically adjusts throughout the day. Participants are engaged, asking questions and chiming in with their personal experiences.&nbsp;</p><p>Outside of the center, Georgia Tech researchers are developing a tablet application for members and their care partners, which provides curated information about MCI.</p><p>&ldquo;We&rsquo;re able to foster a continuum of care by providing useable and useful information even when members aren&rsquo;t at the program facility,&rdquo; said Beth Mynatt, executive director of the <a href="http://ipat.gatech.edu">Institute for People and Technology</a> and co-director of the Cognitive Empowerment Program technology core.</p><p>Mynatt modeled the MCI application on her previous work on the <a href="http://ipat.gatech.edu/news/novel-app-uses-ai-guide-support-cancer-patients">MyPath</a> application for breast cancer patients.</p><p>Gari Clifford, professor of biomedical informatics at Emory, co-leads the technology core, directing sensing and analytics research to discover new patterns that best depict progress or decline in people with MCI. Drawing on expertise from Georgia Tech&rsquo;s <a href="http://awarehome.gatech.edu/">Aware Home</a> and <a href="https://homelab.gtri.gatech.edu/">Home Lab</a>, technology core researchers are also creating <a href="http://ipat.gatech.edu/georgia-tech-and-people-power-partner-senior-care-project">smart home technologies</a> to monitor members&rsquo; activity, guide overall MCI care, and provide personalized support for everyday activities and concerns.</p><p>The Cognitive Empowerment Program will recruit a total of 90 participants in the first year, whom researchers will follow for one year. Program participants have already bonded with researchers, staff, and each other over a shared experience, carpooling to the center and forming friendships and support networks outside of the program.&nbsp;</p><p>&ldquo;We&rsquo;re embedded in people&rsquo;s lives,&rdquo; DuBose said. &ldquo;I&rsquo;m hopeful that they&rsquo;ll become engaged and trust us, and that they see themselves as collaborators in research.&rdquo;</p><p><strong>Editor&rsquo;s note</strong>: The Cognitive Empowerment Program suspended in-person programming on March 17 in light of the COVID-19 pandemic. The technology core research team immediately provided the MyCEP tablet application to support virtual programming by the therapeutic team. This rapid research initiative will explore how to support empowerment for people with MCI using online and interactive content. In-person programming will resume as soon as it&rsquo;s safe for members.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: Alyson Powell Key</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1585787336</created>  <gmt_created>2020-04-02 00:28:56</gmt_created>  <changed>1585788690</changed>  <gmt_changed>2020-04-02 00:51:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The new Georgia Tech-Emory University Cognitive Empowerment Program provides new hope.]]></teaser>  <type>news</type>  <sentence><![CDATA[The new Georgia Tech-Emory University Cognitive Empowerment Program provides new hope.]]></sentence>  <summary><![CDATA[<p>The new Georgia Tech-Emory University Cognitive Empowerment Program provides people with mild cognitive impairment and their caregivers with resources, education, and &ldquo;a whole new level of hope.&rdquo;</p>]]></summary>  <dateline>2020-04-01T00:00:00-04:00</dateline>  <iso_dateline>2020-04-01T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-04-01 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>633998</item>          <item>633999</item>          <item>634000</item>      </media>  <hg_media>          <item>          <nid>633998</nid>          <type>image</type>          <title><![CDATA[Lyn Reagan and Steve Baltz]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[lyn-steve.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/lyn-steve.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/lyn-steve.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/lyn-steve.jpg?itok=d0Cw1P-E]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cognitive Empowerment Program participants]]></image_alt>                    <created>1585786455</created>          <gmt_created>2020-04-02 00:14:15</gmt_created>          <changed>1585828359</changed>          <gmt_changed>2020-04-02 11:52:39</gmt_changed>      </item>          <item>          <nid>633999</nid>          <type>image</type>          <title><![CDATA[Cognitive Empowerment Program participants Fred and Marsha Rueff]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fred-marsha rueff.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fred-marsha%20rueff.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fred-marsha%20rueff.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fred-marsha%2520rueff.jpg?itok=C_BxW8_O]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Program participants Fred and Marsha Rueff]]></image_alt>                    <created>1585786608</created>          <gmt_created>2020-04-02 00:16:48</gmt_created>          <changed>1585786608</changed>          <gmt_changed>2020-04-02 00:16:48</gmt_changed>      </item>          <item>          <nid>634000</nid>          <type>image</type>          <title><![CDATA[Innovation Accelerator]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[innovation-accelerator.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/innovation-accelerator.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/innovation-accelerator.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/innovation-accelerator.png?itok=vxIAqsCt]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Cognitive Empowerment Program innovation accelerator]]></image_alt>                    <created>1585786755</created>          <gmt_created>2020-04-02 00:19:15</gmt_created>          <changed>1585786755</changed>          <gmt_changed>2020-04-02 00:19:15</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="180249"><![CDATA[Mild Cognitive Impairment]]></keyword>          <keyword tid="183127"><![CDATA[cognitive empowerment program]]></keyword>          <keyword tid="1912"><![CDATA[brain]]></keyword>          <keyword tid="184361"><![CDATA[brain health]]></keyword>          <keyword tid="2014"><![CDATA[Cognition]]></keyword>          <keyword tid="1228"><![CDATA[memory]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="633804">  <title><![CDATA[Georgia Tech Professor Uses Virtual Reality to Move Major Conference Online]]></title>  <uid>27303</uid>  <body><![CDATA[<p>This week, 1,800 scientists, engineers, designers, and other experts gathered for the <a href="http://ieeevr.org/2020/">IEEE Conference on Virtual Reality and 3D User Interfaces</a> (IEEE VR). The event brings together people from around the world to examine the latest research and advancements in the area of virtual reality (VR).</p><p>Attendees&nbsp;watched presentations and invited talks and participated in poster and demonstration sessions. It&rsquo;s a typical academic conference in every way except for one significant change this year: it will take place entirely online, with social events hosted completely in virtual environments.</p><p><a href="https://www.cc.gatech.edu/people/blair-macintyre">Blair MacIntyre</a>, a professor in Georgia Tech&rsquo;s <a href="https://ic.gatech.edu/">School of Interactive Computing</a> and IEEE VR conference co-chair, proposed transitioning to an all-virtual event to support social distancing recommendations related to the COVID-19 pandemic.</p><p>&ldquo;We were planning on a small experiment with online attendees to investigate the use of VR to make conferences more accessible and sustainable. Suddenly we needed to ramp up to accommodate everyone across all traditional conference activities,&rdquo; MacIntyre said.</p><p>The entire five-day event convened in Mozilla Hubs, an online platform for remote virtual experiences. IEEE VR marks the first time that a major academic conference of this scale will move online and depend solely on a virtual environment platform, including the social networking sessions that are an essential part of conferences.</p><p>The virtual experience merges video conferencing, video streaming, and online chat platforms with a custom version of Hubs. The platform operates in most web browsers, and conference attendees can join whether or not they have a VR device. As with an in-person conference, participants will watch and discuss talks, take part in parallel sessions, and network one-on-one while interacting through avatars.</p><p>The conference is&nbsp;taking&nbsp;place in Eastern Standard Time. While organizers acknowledge that it will be difficult for people in other time zones to attend, they say there are other benefits of a virtual conference such as better work-life balance.</p><p>&ldquo;One of the hardest things for people to do in this sort of format is focus on the content,&rdquo; said Kyle Johnsen, IEEE VR co-chair and associate professor of engineering in the College of Engineering, University of Georgia. &ldquo;If you&rsquo;re going to a virtual conference, you need to treat it like you&rsquo;re at an in-person conference, at least during the business day. One of the huge advantages is that you still get to tuck your kids in at night, which is awesome, and we don&rsquo;t want to lose that, but you do need to maintain the same level of time commitment. That&rsquo;s the value of conferences.&rdquo;</p><p><strong>Social Change Through Technology</strong><br />MacIntyre began exploring the use of Hubs in 2019 to address climate change and the carbon impact of long-haul flights to academic conferences. He points out that the carbon impact of a recent round-trip he took to a conference in Berlin, Germany, was higher than that of his own four-person household for an entire month.</p><p>He also views virtual experiences as a way of democratizing academic conferences, which are often limited to attendees from well-funded colleges, universities, and companies, while shutting out those who can&rsquo;t afford to spend thousands of dollars on travel or leave their jobs or families for a week or more.</p><p>&ldquo;If we can take something like IEEE VR, which is normally around 1,000 people, and turn it into an event where 10,000 people can attend, we&rsquo;ll have a much more diverse and inclusive event.&rdquo;</p><p>Now, with recent global challenges of the coronavirus, technology is once again at the forefront of shaping our society &ndash; changes that we&rsquo;re seeing, and living, in real-time. Whether it&rsquo;s attending a virtual reality conference, working remotely, or taking a class online, &ldquo;technology has the opportunity to help people connect,&rdquo; MacIntyre said.</p><p>One recent example &ndash; the City of Atlanta has created an emergency fund to assist those impacted by COVID-19, $1 million of which will go toward purchasing technology to support the city&rsquo;s telework deployment.</p><p>While our current crisis has forced an evolution in how we&rsquo;re interacting through technology, he wonders about a permanent change in the future. &ldquo;How many companies will shift to online? How many people will demand the opportunity? It will be interesting to see how we all feel after coming out of this forced remote experiment.&rdquo;&nbsp;</p><p>Any long-term technology transformation would mean an entire cultural shift, he said. &ldquo;The technologies are there and can support remote work and education in different ways, but it only works if there&rsquo;s a commitment.&rdquo;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (404-272-2780) (ben.brumfield@comm.gatech.edu).</p><p><strong>Writer</strong>: Alyson Powell Key</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1585085043</created>  <gmt_created>2020-03-24 21:24:03</gmt_created>  <changed>1585139190</changed>  <gmt_changed>2020-03-25 12:26:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[For the first time in its 26-year history, IEEE VR will meet in an all-virtual environment.]]></teaser>  <type>news</type>  <sentence><![CDATA[For the first time in its 26-year history, IEEE VR will meet in an all-virtual environment.]]></sentence>  <summary><![CDATA[<p>For the first time in its 26-year history, the IEEE VR conference will meet in an all-virtual environment, a transition made to support social distancing recommendations related to the COVID-19 pandemic.</p>]]></summary>  <dateline>2020-03-24T00:00:00-04:00</dateline>  <iso_dateline>2020-03-24T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-03-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>633800</item>          <item>633801</item>          <item>633803</item>      </media>  <hg_media>          <item>          <nid>633800</nid>          <type>image</type>          <title><![CDATA[IEEE VR Conference Moves Online]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[thumbnail_Untitled 3.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/thumbnail_Untitled%203.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/thumbnail_Untitled%203.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/thumbnail_Untitled%25203.png?itok=WmYO8Eic]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Conference graphic]]></image_alt>                    <created>1585084264</created>          <gmt_created>2020-03-24 21:11:04</gmt_created>          <changed>1585084264</changed>          <gmt_changed>2020-03-24 21:11:04</gmt_changed>      </item>          <item>          <nid>633801</nid>          <type>image</type>          <title><![CDATA[IEEE VR Conference Moves Online - 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[thumbnail_DSC_6323.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/thumbnail_DSC_6323.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/thumbnail_DSC_6323.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/thumbnail_DSC_6323.jpg?itok=08hm4vmw]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Image from IEEE online conference]]></image_alt>                    <created>1585084426</created>          <gmt_created>2020-03-24 21:13:46</gmt_created>          <changed>1585084426</changed>          <gmt_changed>2020-03-24 21:13:46</gmt_changed>      </item>          <item>          <nid>633803</nid>          <type>image</type>          <title><![CDATA[Georgia Tech Researcher Blair MacIntyre]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[blair-macintyre.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/blair-macintyre.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/blair-macintyre.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/blair-macintyre.jpg?itok=KN_Q72uS]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Georgia Tech researcher Blair MacIntyre]]></image_alt>                    <created>1585084650</created>          <gmt_created>2020-03-24 21:17:30</gmt_created>          <changed>1585084650</changed>          <gmt_changed>2020-03-24 21:17:30</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="145251"><![CDATA[virtual reality]]></keyword>          <keyword tid="184284"><![CDATA[GTCOVID]]></keyword>          <keyword tid="184321"><![CDATA[online conference]]></keyword>          <keyword tid="1187"><![CDATA[IEEE]]></keyword>          <keyword tid="184322"><![CDATA[virtual environment]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="633643">  <title><![CDATA[Cyber Hygiene Keeps Your Email Safe from Virtual Viruses]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The email is from someone you think is a co-worker in another department at your company, who like you, has suddenly found herself teleworking from home without the usual group of colleagues to help review things. She&rsquo;s asking your advice on a document attached to the email.</p><p>Being the helpful person that you are, you should just open up that file and give it a look, right? Wrong, says <a href="https://www.ece.gatech.edu/faculty-staff-directory/brendan-d-saltaformaggio">Brendan Saltaformaggio</a>, a cybersecurity expert and assistant professor in the Georgia Tech <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>.</p><p>Cyber criminals are taking advantage of the fact that more of us are working from home, away from the online safeguards we may have at work. What appears to be an email from a colleague in another department could be an attack that tricks recipients into opening attachments and silently installs malware.</p><p>&ldquo;People will be doing a lot more over email when they work from home,&rdquo; Saltaformaggio noted. &ldquo;They will be corresponding more with co-workers, sending potentially sensitive documents and interacting with people they may not necessarily know using computer systems that may not have been intended for secure use. That increases risk.&rdquo;</p><p>To stay safe from viruses and other malware, Saltaformaggio offers five tips for dealing with email while teleworking under these special conditions &ndash; and during the normal office conditions that we hope to resume soon.</p><ul><li>Don&#39;t click links in emails when you don&#39;t know the sender. Malicious links are among the most common sources of malware. Always hover over a link to be shown the website it links to. Be sure it is the website you expect before you click.</li><li>Double-check before you open files that get emailed to you, especially if they are unexpected. If anything about that email looks suspicious, don&#39;t hesitate to call up the sender and ask if they have really just sent you a file.&nbsp;</li><li>When attaching files to email, always double check who you&#39;re sending it to. One small typo could send sensitive information to a stranger.</li><li>Watch out for phishing! If something asks for your username and password, don&#39;t hesitate to call up your IT people and ask whether that request is legitimate. Your network administrator won&rsquo;t send you an email asking to you to log into a strange website.</li><li>Thought you had avoided traffic by working at home? Networks can get overloaded when everyone is teleworking. Teleworking spouses and children streaming movies can quickly jam a home internet connection. If everything seems clear on your end, report excessive slowdowns to your IT department.</li></ul><p>&ldquo;Teleworking can help companies get their staffs safely through this crisis, but we all need to be careful to practice good cyber hygiene, just as we are washing our hands to avoid an infection from viruses in the physical world,&rdquo; Saltaformaggio said.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1584494117</created>  <gmt_created>2020-03-18 01:15:17</gmt_created>  <changed>1584496626</changed>  <gmt_changed>2020-03-18 01:57:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Teleworking can create a new set of risks surrounding email use that require precautions. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Teleworking can create a new set of risks surrounding email use that require precautions. ]]></sentence>  <summary><![CDATA[<p>Teleworking can create a new set of risks surrounding email. A Georgia Tech cybersecurity researcher offers some tips for staying safe on the Internet.</p>]]></summary>  <dateline>2020-03-17T00:00:00-04:00</dateline>  <iso_dateline>2020-03-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-03-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>633641</item>          <item>633642</item>      </media>  <hg_media>          <item>          <nid>633641</nid>          <type>image</type>          <title><![CDATA[Coping with COVID]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Steven 1-18.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Steven%201-18.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Steven%201-18.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Steven%25201-18.png?itok=3shBHWrX]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Workers in a university lab]]></image_alt>                    <created>1584493388</created>          <gmt_created>2020-03-18 01:03:08</gmt_created>          <changed>1584561934</changed>          <gmt_changed>2020-03-18 20:05:34</gmt_changed>      </item>          <item>          <nid>633642</nid>          <type>image</type>          <title><![CDATA[Working from Home (Getty)]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GettyImages-1175128294.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/GettyImages-1175128294.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/GettyImages-1175128294.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/GettyImages-1175128294.jpg?itok=4xC7TaAJ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Woman teleworking with phone]]></image_alt>                    <created>1584493577</created>          <gmt_created>2020-03-18 01:06:17</gmt_created>          <changed>1584493577</changed>          <gmt_changed>2020-03-18 01:06:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="184282"><![CDATA[teleworking]]></keyword>          <keyword tid="8119"><![CDATA[email]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="344"><![CDATA[cyber]]></keyword>          <keyword tid="184284"><![CDATA[GTCOVID]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="631208">  <title><![CDATA[$25 Million Project Will Advance DNA-Based Archival Data Storage]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The demand for archival data storage has been skyrocketing, and if a new research initiative reaches its goals, that need could be met by taking advantage of an efficient and robust information storage medium that has proven itself through the centuries: the biopolymer DNA.</p><p>The Intelligence Advanced Research Projects Activity&rsquo;s (IARPA) Molecular Information Storage (MIST) program has awarded a multi-phase contract worth up to $25 million to develop scalable DNA-based molecular storage techniques. The goal of the project, which will be led by the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI), is to use DNA as the basis for deployable storage technologies that can eventually scale into the exabyte regime and beyond with reduced physical footprint, power and cost requirements relative to conventional storage technologies.&nbsp;</p><p>The technology already exists for storing and reading information into DNA &mdash; which also encodes the genetic blueprint for living organisms &mdash; but significant advances will be needed to make it commercially practical and cost competitive with established magnetic tape and optical disk memory. While current archival storage has a limited lifetime, information stored in DNA could last for hundreds of years.</p><p>&ldquo;The goal is to significantly reduce the size, weight and power required for archival data storage,&rdquo; said Alexa Harter, director of GTRI&rsquo;s Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory. &ldquo;What would take acres in a data farm today could be kept in a device the size of the tabletop. We want to significantly improve all kinds of metrics for long-term data storage.&rdquo;</p><p>The Scalable Molecular Archival Software and Hardware (SMASH) project resulted from a proposal prepared by GTRI, San Francisco-based Twist Bioscience, San Diego-based Roswell Biotechnologies, and the University of Washington in collaboration with Microsoft.&nbsp;</p><p>In the project plans, Twist will engineer a DNA synthesis platform on silicon that &ldquo;writes&rdquo; the DNA strands that carry the data. Roswell will provide DNA sequencing, or &quot;reading&quot; technology, and the University of Washington &ndash; in collaboration with Microsoft &ndash; will bring system architecture, data analysis and coding expertise to the project. At Georgia Tech, the project will involve fabrication facilities at the Institute for Electronics and Nanotechnology and researchers in such specialties as chemistry and information theory, who will also draw from four of GTRI&rsquo;s eight laboratories.</p><p>&ldquo;The reason people are looking at DNA for storage is that it has evolved over the ages as a very compact and reliable means of information storage,&rdquo; said Nicholas Guise, a GTRI senior research scientist. &ldquo;It&rsquo;s so compact that a practical DNA archive could store an exabyte of data&mdash;equivalent to a million terabyte hard drives&mdash;in a volume about the size of a sugar cube. Scientists have been able to read DNA from animals that died centuries ago, so the data lasts essentially forever under the right conditions.&rdquo;</p><p>Technology for encoding and decoding DNA works at small scales today, but to be useful for commercial archival purposes, researchers will have to scale up the production of synthetic DNA, reliably connect it to established computing systems and improve the speed of the data writing and reading process. The project goal would be to encode and decode terabytes of data in a day at costs and rates more than 100 times better than current technologies.</p><p>DNA data storage won&rsquo;t initially replace server farms for information that must be accessed quickly and often. Because of the time required for reading and decoding, the technique would be useful for information that must be kept indefinitely, but accessed infrequently.&nbsp;&nbsp;</p><p>Part of the technical challenge is interfacing the DNA with standard CMOS electronic technologies. The researchers plan to build hybrid chips in which the DNA grows above layers containing the electronics. The overall project will leverage the efficiencies of current semiconductor technologies, said Brooke Beckert, a GTRI research engineer.&nbsp;</p><p>&ldquo;We&rsquo;ll be working with commercial foundries, so when we get the processing right, it should be much easier to transition the technology over to them,&rdquo; she said. &ldquo;Connecting to the existing technology infrastructure is a critical part of this project, but we&rsquo;ll have to custom-make most of the components in the first stage.&rdquo;</p><p>Among the challenges will be managing the tradeoffs between speed and error, said Guise. &ldquo;The issue is how far down we can scale this without introducing too many errors,&rdquo; he said. &ldquo;The basic synthesis is proven at a scale of hundreds of microns. We want to shrink that by a factor of 100, which leads us to worry about such issues as crosstalk between different DNA strands in adjacent locations on the chips.&rdquo;</p><p>Current technology uses modified inkjet printing to produce the DNA strands, but the SMASH project plans to grow the biopolymer more rapidly and in larger quantities using parallelized synthesis on the hybrid chips.</p><p>To achieve the major advances in reading cost and speed required, the program will rely on the molecular electronic DNA reader chips under development at Roswell. The data will be read from DNA strands using a molecular electronic sensor array chip, on which single molecules are drawn through nanoscale current meters that measure electrical signatures of each letter in the sequence.&nbsp; For biomedical applications, the sequencing industry has been focused on a goal of achieving a $1,000 human genome. The DNA reading goals of this program amount to delivering a $10 genome, and that will require a major technology disruption.</p><p>The researchers acknowledge the challenges ahead in bringing their devices to commercial scale.</p><p>&ldquo;We don&rsquo;t see any killers ahead for this technology,&rdquo; said Adam Meier, a GTRI senior research scientist. &ldquo;There is a lot of emerging technology and doing this commercially will require many orders of magnitude improvement. Magnetic tape for archival storage has been improving steadily for 60 years, and this investment from IARPA will power the advancements needed to make DNA storage competitive with that.&quot;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1579140492</created>  <gmt_created>2020-01-16 02:08:12</gmt_created>  <changed>1579184379</changed>  <gmt_changed>2020-01-16 14:19:39</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new research initiative is using DNA as an efficient and robust archival storage medium.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new research initiative is using DNA as an efficient and robust archival storage medium.]]></sentence>  <summary><![CDATA[<p>The demand for archival data storage has been skyrocketing, and if a new research initiative reaches its goals, that need could be met by taking advantage of an efficient and robust information storage medium that has proven itself through the centuries: the biopolymer DNA.</p>]]></summary>  <dateline>2020-01-16T00:00:00-05:00</dateline>  <iso_dateline>2020-01-16T00:00:00-05:00</iso_dateline>  <gmt_dateline>2020-01-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>631205</item>          <item>631206</item>          <item>631207</item>      </media>  <hg_media>          <item>          <nid>631205</nid>          <type>image</type>          <title><![CDATA[DNA Data Storage Researchers]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[dna-storage-115.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/dna-storage-115.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/dna-storage-115.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/dna-storage-115.jpg?itok=156rC9T-]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[DNA data storage researchers at clean room]]></image_alt>                    <created>1579139387</created>          <gmt_created>2020-01-16 01:49:47</gmt_created>          <changed>1579139387</changed>          <gmt_changed>2020-01-16 01:49:47</gmt_changed>      </item>          <item>          <nid>631206</nid>          <type>image</type>          <title><![CDATA[Data Storage Researchers at Cleanroom]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[dna-storage-106.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/dna-storage-106.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/dna-storage-106.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/dna-storage-106.jpg?itok=iXe1dmnf]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[DNA data storage researchers at clean room]]></image_alt>                    <created>1579139528</created>          <gmt_created>2020-01-16 01:52:08</gmt_created>          <changed>1579139528</changed>          <gmt_changed>2020-01-16 01:52:08</gmt_changed>      </item>          <item>          <nid>631207</nid>          <type>image</type>          <title><![CDATA[DNA Data Storage Researchers2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[dna-storage-113.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/dna-storage-113.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/dna-storage-113.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/dna-storage-113.jpg?itok=aZr7US5T]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[DNA data storage researchers at clean room]]></image_alt>                    <created>1579139645</created>          <gmt_created>2020-01-16 01:54:05</gmt_created>          <changed>1579139645</changed>          <gmt_changed>2020-01-16 01:54:05</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="1041"><![CDATA[dna]]></keyword>          <keyword tid="438"><![CDATA[data]]></keyword>          <keyword tid="183605"><![CDATA[data storage]]></keyword>          <keyword tid="183607"><![CDATA[archival storage]]></keyword>          <keyword tid="6191"><![CDATA[BioPolymer]]></keyword>          <keyword tid="167151"><![CDATA[sequencing]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39471"><![CDATA[Materials]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="630798">  <title><![CDATA[Georgia Tech Collaborates with IBM to Develop Software Stacks for Quantum Computers]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The Georgia Institute of Technology has announced its agreement to join the IBM Q Hub at the Oak Ridge National Laboratory (ORNL) to help advance the fundamental research and use of quantum computing in building software infrastructure and developing specialized error mitigation techniques. Georgia Tech will have cloud access, via the Oak Ridge Hub, to the world&rsquo;s largest fleet of universal quantum computing systems for commercial use case exploration and fundamental research.</p><p>&ldquo;Access to IBM machines will allow Georgia Tech to build software infrastructure to make it easier to operate quantum machines, create specialized error mitigation techniques in software &ndash; thereby mitigating some of the hardware errors &ndash; and develop algorithms and applications for the emerging noisy intermediate-scale quantum (NISQ) computing paradigm,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/moinuddin-k-qureshi">Moinuddin Qureshi</a>, a professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>. &ldquo;Access will also allow Georgia Tech researchers to better understand the error patterns in existing quantum computers, which can help with developing the architecture for future machines.&rdquo;</p><p>As part of the ORNL hub, Georgia Tech will join a community of Fortune 500 companies, startups, academic institutions and research labs working to advance quantum computing and explore practical applications. Georgia Tech will leverage IBM&rsquo;s quantum expertise and resources, Qiskit software and developer tools, and will have cloud-based access to IBM&rsquo;s Quantum Computation Center. IBM makes available through the cloud 15 of the most-advanced universal quantum computing systems available, including a 53-qubit system &ndash; the most qubits of a universal quantum computer commercially available in the industry.&nbsp;</p><p>Since the IBM Q Network&rsquo;s launch in 2017 it has grown to more than 100 organizations, collaborating with IBM and one another to advance fundamental quantum computing research, and the development of practical applications for business and science.&nbsp;</p><p>Research is being conducted worldwide to develop a new type of computational device known as a quantum computer, based on the principles of quantum physics. Quantum computers could tackle specialized computational problems such as integer factorization, understanding materials properties or optimization challenges much faster than conventional digital computers. Quantum computers will use one of a number of possible approaches to create quantum bits &ndash; units known as qubits &ndash; to compute and store data, giving them unique advantages over computers based on silicon transistors.</p><p>While the machines have great promise, there are difficult challenges in operating such machines and in writing software that will take advantage of their power, Qureshi said.</p><p>The agreement will give Georgia Tech access to IBM&rsquo;s premium systems, including the 53-qubit quantum computer. &ldquo;In the regime between 50 and 60 qubits is where quantum machines can potentially do computations that are beyond the capabilities of existing conventional computers,&rdquo; Qureshi said.</p><p><strong>About the Georgia Institute of Technology</strong></p><p>The Georgia Institute of Technology, also known as Georgia Tech, is one of the leading public research universities in the United States. Georgia Tech provides a technologically focused education to more than 36,000 undergraduate and graduate students in fields ranging from engineering, computing, and sciences, to business, design, and liberal arts. Research, economic development and other sponsored activities at Georgia Tech passed a significant milestone during the fiscal year that concluded on June 30, 2019, recording more than a billion dollars in new grants, contracts and other awards.&nbsp;<br />&nbsp;<br /><strong>About IBM Q&nbsp;</strong><br />&nbsp;<br />IBM Q is an industry-first initiative to build commercial universal quantum systems for business and science applications. For more information about IBM&#39;s quantum computing efforts, please visit www.ibm.com/ibmq.&nbsp;IBM Q Network&trade; and IBM Q&trade; are trademarks of International Business Machines Corporation.</p><p>- <em>Written in collaboration with IBM.</em></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1578513163</created>  <gmt_created>2020-01-08 19:52:43</gmt_created>  <changed>1578513351</changed>  <gmt_changed>2020-01-08 19:55:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech has agreed to join the IBM Q Hub at the Oak Ridge National Laboratory.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech has agreed to join the IBM Q Hub at the Oak Ridge National Laboratory.]]></sentence>  <summary><![CDATA[<p>The Georgia Institute of Technology has announced its agreement to join the IBM Q Hub at the Oak Ridge National Laboratory (ORNL) to advance the fundamental research and use of quantum computing in building software infrastructure and developing specialized error mitigation techniques. Georgia Tech will have cloud access, via the Oak Ridge Hub, to the world&rsquo;s largest fleet of universal quantum computing systems for commercial use case exploration and fundamental research.</p>]]></summary>  <dateline>2020-01-08T00:00:00-05:00</dateline>  <iso_dateline>2020-01-08T00:00:00-05:00</iso_dateline>  <gmt_dateline>2020-01-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>630796</item>          <item>630797</item>      </media>  <hg_media>          <item>          <nid>630796</nid>          <type>image</type>          <title><![CDATA[IBM Quantum Computer]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[IBM_SystemOne_Andrew_Lindemann.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/IBM_SystemOne_Andrew_Lindemann.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/IBM_SystemOne_Andrew_Lindemann.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/IBM_SystemOne_Andrew_Lindemann.jpg?itok=ioMFiNdt]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IBM quantum computer]]></image_alt>                    <created>1578512700</created>          <gmt_created>2020-01-08 19:45:00</gmt_created>          <changed>1578512700</changed>          <gmt_changed>2020-01-08 19:45:00</gmt_changed>      </item>          <item>          <nid>630797</nid>          <type>image</type>          <title><![CDATA[IBM Quantum Computer2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[IBM_SystemOne_Andrew_Lindemann_2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/IBM_SystemOne_Andrew_Lindemann_2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/IBM_SystemOne_Andrew_Lindemann_2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/IBM_SystemOne_Andrew_Lindemann_2.jpg?itok=SiHIYgcY]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IBM quantum computer]]></image_alt>                    <created>1578512815</created>          <gmt_created>2020-01-08 19:46:55</gmt_created>          <changed>1578512815</changed>          <gmt_changed>2020-01-08 19:46:55</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="149"><![CDATA[Nanotechnology and Nanoscience]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="149"><![CDATA[Nanotechnology and Nanoscience]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="1744"><![CDATA[quantum]]></keyword>          <keyword tid="4359"><![CDATA[quantum computing]]></keyword>          <keyword tid="1126"><![CDATA[ibm]]></keyword>          <keyword tid="183487"><![CDATA[software stacks]]></keyword>          <keyword tid="183488"><![CDATA[error mitigation]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="592538">  <title><![CDATA[New Computing System Takes Its Cues from Human Brain]]></title>  <uid>31758</uid>  <body><![CDATA[<p>Some problems are so challenging to solve that even the most advanced computers need weeks, not seconds, to process them.</p><p>Now a team of researchers at Georgia Institute of Technology and University of Notre Dame has created a new computing system that aims to tackle one of computing&rsquo;s hardest problems in a fraction of the time.</p><p>&ldquo;We wanted to find a way to solve a problem without using the normal binary representations that have been the backbone of computing for decades,&rdquo; said Arijit Raychowdhury, an associate professor in Georgia Tech&rsquo;s School of Electrical and Computer Engineering.</p><p>Their new system employs a network of electronic oscillators to solve graph coloring tasks &ndash; a type of problem that tends to choke modern computers.</p><p>Details of the study were published April 19 in the journal <em>Scientific Reports</em>. &nbsp;The research was conducted with support from the National Science Foundation, the Office of Naval Research, the Semiconductor Research Corporation and the Center for Low Energy Systems Technology.</p><p>&ldquo;Applications today are demanding faster and faster computers to help solve challenges like resource allocation, machine learning and protein structure analysis &ndash; problems which at their core are closely related to graph coloring,&rdquo; Raychowdhury said. &ldquo;But for the most part, we&rsquo;ve reached the limitations of modern digital computer processors. Some of these problems that are so computationally difficult to perform, it could take a computer several weeks to solve.&rdquo;</p><p>A graph coloring problem starts with a graph &ndash; a visual representation of a set of objects connected in some way. To solve the problem, each object must be assigned a color, but two objects directly connected cannot share the same color. Typically, the goal is to color all objects in the graph using the smallest number of different colors.</p><p>In designing a system different from traditional transistor-based computing, the researchers took their cues from the human brain, where processing is handled collectively, such as a neural oscillatory network, rather than with a central processor.</p><p>&ldquo;It&rsquo;s the notion that there is tremendous power in collective computing,&rdquo; said Suman Datta, Chang Family professor in Notre Dame&rsquo;s College of Engineering and one of the study&rsquo;s co-authors. &ldquo;In natural forms of computing, dynamical systems with complex interdependencies evolve rapidly and solve complex sets of equations in a massively parallel fashion.&rdquo;</p><p>The electronic oscillators, fabricated from vanadium dioxide, were found to have a natural ability that could be harnessed for graph coloring problems. When a group of oscillators were electrically connected via capacitive links, they automatically synchronized to the same frequency &ndash; oscillating at the same rate. Meanwhile, oscillators directly connected to one another would operate at different phases within the same frequency, and oscillators in the same group but not directly connected would sync in both frequency and phase.</p><p>&ldquo;If you suppose that each phase represents a different color, this system was essentially mimicking naturally the solution to a graph coloring problem,&rdquo; said Raychowdhury, who is also the ON Semiconductor Junior Professor at Georgia Tech.</p><p>The researchers were able to create a small network of oscillators to solve graph coloring problems with the same number of objects, which are also referred to as nodes or vertices. But even more significant, the new system theoretically proved that a connection existed between graph coloring and the natural dynamics of coupled oscillatory systems.</p><p>&ldquo;This is a critical step because we can prove why this is happening and that it covers all possible instances of graphs,&rdquo; Raychowdhury said. &ldquo;This opens up a new way of performative computation and constructing novel computational models. This is novel in that it&rsquo;s a physics-based computing approach, but it also presents tantalizing opportunities for building other customized analog systems for solving hard problems efficiently.&rdquo;</p><p>That could be valuable to a range of companies looking for computers to help optimize their resources, such as a power utility wanting to maximize efficiency and usage of a vast electrical grid under certain constraints.</p><p>&quot;This work provides one of the first constructive ways to build continuous time dynamical system solvers for a combinatorial optimization problem with a working demonstration using compact scalable post-CMOS devices,&quot; said Abhinav Parihar, a Georgia Tech student who worked on the project.</p><p>The next step would be building a larger network of oscillators that could handle graph coloring problems with more objects at play.</p><p>&ldquo;Our goal is to reach a system with hundreds of oscillators, which would put us in striking distance of developing a computing substrate that could solve graph coloring problems whose optimal solutions are not yet known to mankind,&rdquo; Datta said.</p><p><em>This material is based upon work supported by the National Science Foundation under Grant No. 1640081, the Semiconductor Research Corporation&nbsp;under research task Nos. 2698.001 and 2698.002, and the Office of Naval Research under award No. N00014-11-1-0665. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of those agencies.</em></p><p><strong>CITATION:</strong>&nbsp;Abhinav Parihar, Nikhil Shukla, Matthew Jerry, Suman Datta and Arijit Raychowdhury,&nbsp;&ldquo;Vertex coloring of graphs via phase dynamics of coupled oscillatory networks,&rdquo; (Scientific Reports, April 2017). <a href="http://dx.doi.org/10.1038/s41598-017-00825-1">http://dx.doi.org/10.1038/s41598-017-00825-1</a></p>]]></body>  <author>Josh Brown</author>  <status>1</status>  <created>1496947938</created>  <gmt_created>2017-06-08 18:52:18</gmt_created>  <changed>1578410473</changed>  <gmt_changed>2020-01-07 15:21:13</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A team of researchers at Georgia Institute of Technology and University of Notre Dame has created a new computing system that aims to tackle one of computing’s hardest problems in a fraction of the time.]]></teaser>  <type>news</type>  <sentence><![CDATA[A team of researchers at Georgia Institute of Technology and University of Notre Dame has created a new computing system that aims to tackle one of computing’s hardest problems in a fraction of the time.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2017-06-08T00:00:00-04:00</dateline>  <iso_dateline>2017-06-08T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-06-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[john.toon@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:john.toon@comm.gatech.edu">John Toon</a></p><p>Research News</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>592542</item>          <item>592541</item>      </media>  <hg_media>          <item>          <nid>592542</nid>          <type>image</type>          <title><![CDATA[Vertex coloring of graph]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[graph.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/graph_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/graph_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/graph_0.jpg?itok=F9OAFHbF]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1496950296</created>          <gmt_created>2017-06-08 19:31:36</gmt_created>          <changed>1496951179</changed>          <gmt_changed>2017-06-08 19:46:19</gmt_changed>      </item>          <item>          <nid>592541</nid>          <type>image</type>          <title><![CDATA[Arijit Raychowdhury]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[17C10201-P2-001.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/17C10201-P2-001.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/17C10201-P2-001.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/17C10201-P2-001.jpg?itok=wnM4LxrR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1496949877</created>          <gmt_created>2017-06-08 19:24:37</gmt_created>          <changed>1496949877</changed>          <gmt_changed>2017-06-08 19:24:37</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="174647"><![CDATA[graph coloring]]></keyword>          <keyword tid="139771"><![CDATA[Arijit Raychowdhury]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="599832">  <title><![CDATA[Gecko Adhesion Technology Moves Closer To Industrial Uses]]></title>  <uid>31758</uid>  <body><![CDATA[<p>A gecko scampering up a wall or across a ceiling has long fascinated scientists and encouraged them to investigate how to harness lizard&rsquo;s mysterious ability to defy gravity.</p><p>While human-made devices inspired by gecko feet have emerged in recent years, enabling their wearers to slowly scale a glass wall, the possible applications of gecko-adhesion technology go far beyond Spiderman-esque antics.</p><p>A Georgia Institute of Technology researcher is looking into how the technology could be applied in a high-precision industrial setting, such as in robot arms used in manufacturing computer chips.</p><p>&ldquo;There are numerous ways that gecko adhesion could be used in an industrial setting, especially in handling delicate materials like the silicon wafers used in manufacturing computer processors,&rdquo; said Michael Varenberg, an assistant professor in Georgia Tech&rsquo;s George W. Woodruff School of Mechanical Engineering.</p><p>But before robot arms and other devices can implement gecko adhesion technology, researchers need more information about the mechanical and physical characteristics of the human-made adhesive surfaces.</p><p>In a study published Dec. 13 in <em>Journal of the Royal Society Interface</em>, Varenberg looked at a particular type of gecko-inspired adhesive surface and narrowed down a range of angles at which the material will attach stronger and release its grip easier.</p><p>The gecko gets its unique ability through the use of tiny hairs that interact with surfaces at an intermolecular level. It&rsquo;s a one-two process during which the tiny film-like hairs are pressed onto the surface and engaged with a shearing action. They then either hold to the surface or easily release when pulled away at different directions.</p><p>For that process to be replicated in a factory using man-made adhesive technology, researchers must determine the precise angles at which to apply a load to get or release the grip between the robotic arm and the silicon wafer.</p><p>Varenberg&rsquo;s team tested a wall-shaped microstructure surface molded out of polyvinylsiloxane and designed to mimic the gecko&rsquo;s attachment ability. Their tests showed that the optimum attachment angle varies between 60 and 90 degrees, while the microstructure detach at zero force when the pull-off angle reaches 140-160 degrees.</p><p>&ldquo;That relatively wide range to control the attachment and pulling away for these wall-shaped microstructures will make it easier to build a mechanical process around that tolerance,&rdquo; Varenberg said.</p><p>That could hold promise for replacing a current method used during the processing and inspection of silicon wafers in computer processor production. Robot arms employ ceramic chucks that use vacuum or electrostatic grippers to pick up and handle the wafers. Soon after installation, the ceramic contact posts start wearing down due to cyclic loading and release particles that can potentially contaminate the backside of the wafer leading to lithography defects on its front side.</p><p>&ldquo;This reality is inconsistent with the cleanliness standards required in the semiconductor industry,&rdquo; Varenberg said. &ldquo;Using gecko adhesion microstructures instead would be better because they do not generate any damage to wafers and do not wear over time.&rdquo;</p><p>Next steps in the research include simplifying the manufacturing technique, working with industrial-grade materials as well as studying the effects of environment and surface geometry parameters, Varenberg said.</p><p><strong>CITATION</strong>&nbsp;<strong>:</strong> Jae-Kang Kim and Michael Varenberg, &ldquo;Biomimetic wall-shaped adhesive microstructure for shear-induced attachment: the effects of pulling angle and preliminary displacement,&rdquo; (J. R. Soc. Interface, Dec. 13, 2017). http://dx.doi.org/10.1098/rsif.2017.0832</p>]]></body>  <author>Josh Brown</author>  <status>1</status>  <created>1513173982</created>  <gmt_created>2017-12-13 14:06:22</gmt_created>  <changed>1578410259</changed>  <gmt_changed>2020-01-07 15:17:39</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[While human-made devices inspired by gecko feet have emerged in recent years, enabling their wearers to slowly scale a glass wall, the possible applications of gecko-adhesion technology go far beyond Spiderman-esque antics. ]]></teaser>  <type>news</type>  <sentence><![CDATA[While human-made devices inspired by gecko feet have emerged in recent years, enabling their wearers to slowly scale a glass wall, the possible applications of gecko-adhesion technology go far beyond Spiderman-esque antics. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2017-12-13T00:00:00-05:00</dateline>  <iso_dateline>2017-12-13T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-12-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[john.toon@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:john.toon@comm.gatech.edu">John Toon</a></p><p>Research News</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>599833</item>          <item>599834</item>      </media>  <hg_media>          <item>          <nid>599833</nid>          <type>image</type>          <title><![CDATA[Gecko Adhesion Walls]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cover.blue_.high-res.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cover.blue_.high-res.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cover.blue_.high-res.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cover.blue_.high-res.png?itok=SXODSbkF]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1513174201</created>          <gmt_created>2017-12-13 14:10:01</gmt_created>          <changed>1513174303</changed>          <gmt_changed>2017-12-13 14:11:43</gmt_changed>      </item>          <item>          <nid>599834</nid>          <type>image</type>          <title><![CDATA[Michael Varenberg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[18C10302-P8-003.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/18C10302-P8-003.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/18C10302-P8-003.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/18C10302-P8-003.jpg?itok=a22vFOA0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1513174447</created>          <gmt_created>2017-12-13 14:14:07</gmt_created>          <changed>1513174566</changed>          <gmt_changed>2017-12-13 14:16:06</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="176508"><![CDATA[gecko adhesion]]></keyword>      </keywords>  <core_research_areas>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="604462">  <title><![CDATA[Robot Designed to Defend Factories Against Cyberthreats]]></title>  <uid>31758</uid>  <body><![CDATA[<p>It&rsquo;s small enough to fit inside a shoebox, yet this robot on four wheels has a big mission: keeping factories and other large facilities safe from hackers.</p><p>Meet the HoneyBot.&nbsp;</p><p>Developed by a team of researchers at the Georgia Institute of Technology, the diminutive device is designed to lure in digital troublemakers who have set their sights on industrial facilities. HoneyBot will then trick the bad actors into giving up valuable information to cybersecurity professionals.</p><p>The decoy robot arrives as more and more devices &ndash; never designed to operate on the Internet &ndash; are coming online in homes and factories alike, opening up a new range of possibilities for hackers looking to wreak havoc in both the digital and physical world.</p><p>&ldquo;Robots do more now than they ever have, and some companies are moving forward with, not just the assembly line robots, but free-standing robots that can actually drive around factory floors,&rdquo; said Raheem Beyah, the Motorola Foundation Professor and interim Steve W. Chaddick School Chair in Georgia Tech&rsquo;s School of Electrical and Computer Engineering. &ldquo;In that type of setting, you can imagine how dangerous this could be if a hacker gains access to those machines. At a minimum, they could cause harm to whatever products are being produced. If it&rsquo;s a large enough robot, it could destroy parts or the assembly line. In a worst-case scenario, it could injure or cause death to the humans in the vicinity.&rdquo;</p><p>Internet security professionals long have employed decoy computer systems known as &ldquo;honeypots&rdquo; as a way to throw cyberattackers off the trail. The research team applied the same concept to the HoneyBot, which is partially funded with a grant from the National Science Foundation. Once hackers gain access to the decoy, they leave behind valuable information that can help companies further secure their networks.</p><p>&ldquo;A lot of cyberattacks go unanswered or unpunished because there&rsquo;s this level of anonymity afforded to malicious actors on the internet, and it&rsquo;s hard for companies to say who is responsible,&rdquo; said Celine Irvene, a Georgia Tech graduate student who worked with Beyah to devise the new robot. &ldquo;Honeypots give security professionals the ability to study the attackers, determine what methods they are using, and figure out where they are or potentially even who they are.&rdquo;</p><p>The gadget can be monitored and controlled through the internet. But unlike other remote-controlled robots, the HoneyBot&rsquo;s special ability is tricking its operators into thinking it is performing one task, when in reality it&rsquo;s doing something completely different.</p><p>&ldquo;The idea behind a honeypot is that you don&rsquo;t want the attackers to know they&rsquo;re in a honeypot,&rdquo; Beyah said. &ldquo;If the attacker is smart and is looking out for the potential of a honeypot, maybe they&rsquo;d look at different sensors on the robot, like an accelerometer or speedometer, to verify the robot is doing what it had been instructed. That&rsquo;s where we would be spoofing that information as well. The hacker would see from looking at the sensors that acceleration occurred from point A to point B.&rdquo;</p><p>In a factory setting, such a HoneyBot robot could sit motionless in a corner, springing to life when a hacker gains access &ndash; a visual indicator that a malicious actor is targeting the facility.</p><p>Rather than allowing the hacker to then run amok in the physical world, the robot could be designed to follow certain commands deemed harmless &ndash; such as meandering slowly about or picking up objects &ndash; but stopping short of actually doing anything dangerous.</p><p>So far, their technique seems to be working.</p><p>In experiments designed to test how convincing the false sensor data would be to individuals remotely controlling the device, volunteers in December 2017 used a virtual interface to control the robot and could not to see what was happening in real life. To entice the volunteers to break the rules, at specific spots within the maze, they encountered forbidden &ldquo;shortcuts&rdquo; that would allow them to finish the maze faster.</p><p>In the real maze back in the lab, no shortcut existed, and if the participants opted to go through it, the robot instead remained still. Meanwhile, the volunteers &ndash; who have now unwittingly become hackers for the purposes of the experiment &ndash; were fed simulated sensor data indicating they passed through the shortcut and continued along.</p><p>&ldquo;We wanted to make sure they felt that this robot was doing this real thing,&rdquo; Beyah said.</p><p>In surveys after the experiment, participants who actually controlled the device the whole time and those who were being fed simulated data about the fake shortcut both indicated that the data was believable at similar rates.</p><p>&ldquo;This is a good sign because it indicates that we&rsquo;re on the right track,&rdquo; Irvene said.</p><p><em>This material is based upon work supported by the National Science Foundation under Grant No. 1544332. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.</em></p>]]></body>  <author>Josh Brown</author>  <status>1</status>  <created>1522345201</created>  <gmt_created>2018-03-29 17:40:01</gmt_created>  <changed>1578410170</changed>  <gmt_changed>2020-01-07 15:16:10</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[This robot is designed to lure in digital troublemakers who have set their sights on industrial facilities. HoneyBot will then trick the bad actors into giving up valuable information to cybersecurity professionals. ]]></teaser>  <type>news</type>  <sentence><![CDATA[This robot is designed to lure in digital troublemakers who have set their sights on industrial facilities. HoneyBot will then trick the bad actors into giving up valuable information to cybersecurity professionals. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2018-03-29T00:00:00-04:00</dateline>  <iso_dateline>2018-03-29T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-03-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[john.toon@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:john.toon@comm.gatech.edu">John Toon</a></p><p>Research News</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>604473</item>          <item>604468</item>      </media>  <hg_media>          <item>          <nid>604473</nid>          <type>image</type>          <title><![CDATA[HoneyBot Robot]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Screen Shot 2018-03-29 at 2.42.49 PM.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Screen%20Shot%202018-03-29%20at%202.42.49%20PM.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Screen%20Shot%202018-03-29%20at%202.42.49%20PM.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Screen%2520Shot%25202018-03-29%2520at%25202.42.49%2520PM.png?itok=BowCRkvx]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1522349112</created>          <gmt_created>2018-03-29 18:45:12</gmt_created>          <changed>1522349141</changed>          <gmt_changed>2018-03-29 18:45:41</gmt_changed>      </item>          <item>          <nid>604468</nid>          <type>image</type>          <title><![CDATA[Raheem Beyah and Celine Irvene]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Fixer2sm.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Fixer2sm.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Fixer2sm.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Fixer2sm.jpg?itok=EkK5Sdrx]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1522348166</created>          <gmt_created>2018-03-29 18:29:26</gmt_created>          <changed>1522348166</changed>          <gmt_changed>2018-03-29 18:29:26</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="1356"><![CDATA[robot]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="177568"><![CDATA[cyber physical systems]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39461"><![CDATA[Manufacturing, Trade, and Logistics]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="618730">  <title><![CDATA[Researchers Use Machine Learning To More Quickly Analyze Key Capacitor Materials]]></title>  <uid>31758</uid>  <body><![CDATA[<p>Capacitors, given their high energy output and recharging speed, could play a major role in powering the machines of the future, from electric cars to cell phones.&nbsp;</p><p>But the biggest hurdle for these energy storage devices is that they store much less energy than a battery of similar size.</p><p>Researchers at Georgia Institute of Technology are tackling that problem in a novel way, using machine learning to ultimately find ways to build more capable capacitors.</p><p>The method, which was described in February 18 in the journal npj Computational Materials and sponsored by the U.S. Office of Naval Research, involves teaching a computer to analyze at an atomic level two materials that make up some capacitors: aluminum and polyethylene.</p><p>The researchers focused on finding a way to more quickly analyze the electronic structure of those materials, looking for features that could affect performance.</p><p>&ldquo;The electronics industry wants to know the electronic properties and structure of all of the materials they use to produce devices, including capacitors,&rdquo; said Rampi Ramprasad, a professor in the School of Materials Science and Engineering.&nbsp;</p><p>Take a material like polyethylene: it is a very good insulator with a large band gap&mdash;an energy range forbidden to electrical charge carriers. But if it has a defect, unwanted charge carriers are allowed into the band gap, reducing efficiency, he said.&nbsp;<br />&nbsp;<br />&ldquo;In order to understand where the defects are and what role they play, we need to compute the entire atomic structure, something that so far has been extremely difficult,&rdquo; said Ramprasad, who holds the Michael E. Tennenbaum Family Chair and is the Georgia Research Alliance Eminent Scholar in Energy Sustainability. &ldquo;The current method of analyzing those materials using quantum mechanics is so slow that it limits how much analysis can be performed at any given time.&rdquo;</p><p>Ramprasad and his colleagues, who specialize in using machine learning to help develop new materials, used a sample of data created from a quantum mechanics analysis of aluminum and polyethylene as an input to teach a powerful computer how to simulate that analysis.&nbsp;</p><p>Analyzing the electronic structure of a material with quantum mechanics involves solving the Kohn-Sham equation of density functional theory, which generates data on wave functions and energy levels. That data is then used to compute the total potential energy of the system and atomic forces.</p><p>Using the new machine learning method produces similar results eight orders of magnitude faster than using the conventional technique based on quantum mechanics.&nbsp;</p><p>&ldquo;This unprecedented speedup in computational capability will allow us to design electronic materials that are superior to what is currently out there,&rdquo; Ramprasad said. &ldquo;Basically we can say, &lsquo;Here are defects with this material that will really diminish the efficiency of its electronic structure.&rsquo; And once we can address such aspects efficiently, we can better design electronic devices.&rdquo;</p><p>While the study focused on aluminum and polyethylene, machine learning could be used to analyze the electronic structure of a wide range materials. Beyond analyzing electronic structure, other aspects of material structure now analyzed by quantum mechanics could also be hastened by the machine learning approach, Ramprasad said.</p><p>&ldquo;In part we selected aluminum and polyethylene because they are components of a capacitor, but it also allowed us to demonstrate that you can use this method for vastly different materials, such as metals that are conductors and polymers that are insulators,&rdquo; Ramprasad said.</p><p>The faster processing allowed by the machine learning method would also enable researchers to more quickly simulate how modifications to a material will impact its electronic structure, potentially revealing new ways to improve its efficiency. &nbsp;</p><p><em>This research was supported by the Office of Naval Research under grant No. N0014-17-1-2656. The content is the responsibility of the authors and does not necessarily represent the official views of the sponsoring agency.</em></p><p><strong>CITATION:</strong> &nbsp;Anand Chandrasekaran, Deepak Kamal, Rohit Batra, Chiho Kim, Lihua Chen and Rampi Ramprasad, &ldquo;Solving the electronic structure problem with machine learning,&rdquo; (Computational Materials, 2019). http://dx.doi.org/10.1038/s41524-019-0162-7&nbsp;</p>]]></body>  <author>Josh Brown</author>  <status>1</status>  <created>1551712995</created>  <gmt_created>2019-03-04 15:23:15</gmt_created>  <changed>1578409690</changed>  <gmt_changed>2020-01-07 15:08:10</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers at Georgia Institute of Technology are using machine learning to ultimately find ways to build more capable capacitors.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers at Georgia Institute of Technology are using machine learning to ultimately find ways to build more capable capacitors.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2019-03-04T00:00:00-05:00</dateline>  <iso_dateline>2019-03-04T00:00:00-05:00</iso_dateline>  <gmt_dateline>2019-03-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[john.toon@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:john.toon@comm.gatech.edu">John Toon</a></p><p>Research News</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>618727</item>          <item>618729</item>      </media>  <hg_media>          <item>          <nid>618727</nid>          <type>image</type>          <title><![CDATA[Unrolled capacitor]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[rampi2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/rampi2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/rampi2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/rampi2.jpg?itok=y3hGay6t]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1551711709</created>          <gmt_created>2019-03-04 15:01:49</gmt_created>          <changed>1551731369</changed>          <gmt_changed>2019-03-04 20:29:29</gmt_changed>      </item>          <item>          <nid>618729</nid>          <type>image</type>          <title><![CDATA[Anand Chandrasekaran and Rampi Ramprasad]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[rampi1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/rampi1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/rampi1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/rampi1.jpg?itok=Q0L3uJ8-]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1551712132</created>          <gmt_created>2019-03-04 15:08:52</gmt_created>          <changed>1551731346</changed>          <gmt_changed>2019-03-04 20:29:06</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="1692"><![CDATA[materials]]></keyword>          <keyword tid="180707"><![CDATA[computational materials]]></keyword>      </keywords>  <core_research_areas>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="628640">  <title><![CDATA[National Labs, Georgia Tech, Collaborate on AI Research ]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The Georgia Institute of Technology, <a href="http://sandia.gov">Sandia National Laboratories</a>, and the <a href="http://pnnl.gov">Pacific Northwest National Laboratory</a> are jointly launching a new research center to solve some of the most challenging problems in artificial intelligence (AI) today, thanks to $5.5 million in funding from the U.S. Department of Energy (DoE).</p><p>AI enables computer systems to automatically learn from experience without being explicitly programmed. Such technology can perform tasks that formerly only a human could: see, identify patterns, make decisions, and act.</p><p>The new co-design center, known as the Center for ARtificial Intelligence-focused Architectures and Algorithms (ARIAA), funded by DoE&rsquo;s <a href="https://www.energy.gov/science/office-science">Office of Science</a>, will promote collaboration between scientists at the three organizations as they develop core technologies important for the application of AI to DoE mission priorities, such as cybersecurity, electric grid resilience, graph analytics, and scientific simulations.</p><p>PNNL Senior Research Scientist Roberto Gioiosa will be the center&rsquo;s director and will lead the overall vision, strategy, and research direction. <a href="https://www.ece.gatech.edu/faculty-staff-directory/tushar-krishna">Tushar Krishna</a>, an assistant professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> (ECE), and Siva Rajamanickam, a computer scientist at Sandia, will serve as deputy directors.&nbsp;</p><p>Each institution brings to the collaboration a unique strength: PNNL has expertise in power grid simulation, chemistry, and cybersecurity and has research experience in computer architecture and programming models, as well as computing resources such as systems for testing emerging architectures. Sandia has expertise in software simulation of computer systems, machine learning algorithms, graph analytics, and sparse linear algebra, and will provide access to computer facilities and testbed systems to support early access to emerging computing architectures for code development and testing. Georgia Tech has expertise in modeling and developing custom accelerators for machine learning and sparse linear algebra and will develop and provide access to novel hardware prototypes.&nbsp;</p><p>&ldquo;New projects like the center were made possible by the strategic collaboration between Sandia and Georgia Tech for the past few years,&quot; said Sandia&rsquo;s Rajamanickam.</p><p>Special-purpose hardware can enable AI tasks to run faster and use less energy than on conventional computing devices such as CPUs and GPUs. ARIAA is centered around a concept known as &ldquo;co-design,&rdquo; which refers to the need for researchers to weigh and balance the capabilities of hardware and software &ndash; and corral the vastly different types of architectures and algorithms possible to best solve the problems at hand.&nbsp;</p><p>Krishna&rsquo;s lab will lead the effort on architecting and evaluating reconfigurable hardware accelerators that can adapt to the rapidly evolving needs of AI applications. In particular, running sparse computations efficiently will be a key focus. Sparse computations are critical to several computational areas of interest to the DoE because they greatly reduce the number of computations on problems with large amounts of data. One way of thinking about sparsity is that there might be millions or even billions of users on a social media site, but a user cares about updates only from a few hundred friends.</p><p>Krishna, the ON Semiconductor Junior Professor in ECE, works on custom hardware accelerators for AI. In 2015, he co-developed the Eyeriss Deep Learning ASIC (in collaboration with MIT), which was one of the earliest prototypes demonstrating real-time inference on a state-of-the-art deep neural network then known as AlexNet. More recently his lab has been working on an analytical microarchitectural design-space exploration tool for AI accelerators known as MAESTRO (developed in collaboration with NVIDIA) and a reconfigurable AI accelerator platform known as MAERI. Both of these will be leveraged to perform co-design as part of the ARIAA center.</p><p>&ldquo;Georgia Tech provides a great environment to carry out research in hardware-software co-design due to a rich collaborative environment across ECE and the College of Computing, and vibrant research centers such as Machine Learning at Georgia Tech (ML@GT) and the Center for Research into Novel Computing Hierarchies (CRNCH) that bring together researchers with experience in algorithms, compilers, architecture, circuits, and novel devices, fostering collaboration and innovation,&rdquo; said Krishna.</p><p><em>- Adapted from an article by the Pacific Northwest National Laboratory</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1573005713</created>  <gmt_created>2019-11-06 02:01:53</gmt_created>  <changed>1573005842</changed>  <gmt_changed>2019-11-06 02:04:02</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech is part of a new research center created to solve some of the most challenging issues in AI.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech is part of a new research center created to solve some of the most challenging issues in AI.]]></sentence>  <summary><![CDATA[<p>The Georgia Institute of Technology, Sandia National Laboratories, and the Pacific Northwest National Laboratory are jointly launching a new research center to solve some of the most challenging problems in artificial intelligence (AI) today, thanks to $5.5 million in funding from the U.S. Department of Energy (DoE).</p>]]></summary>  <dateline>2019-11-05T00:00:00-05:00</dateline>  <iso_dateline>2019-11-05T00:00:00-05:00</iso_dateline>  <gmt_dateline>2019-11-05 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>628639</item>          <item>628639</item>      </media>  <hg_media>          <item>          <nid>628639</nid>          <type>image</type>          <title><![CDATA[Assistant Professor Tushar Krishna]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[codesign-005.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/codesign-005.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/codesign-005.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/codesign-005.jpg?itok=nFJKvdLH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Assistant Professor Tushar Krishna]]></image_alt>                    <created>1573005071</created>          <gmt_created>2019-11-06 01:51:11</gmt_created>          <changed>1573005071</changed>          <gmt_changed>2019-11-06 01:51:11</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>      </news_terms>  <keywords>          <keyword tid="2835"><![CDATA[ai]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="178471"><![CDATA[co-design]]></keyword>          <keyword tid="213"><![CDATA[energy]]></keyword>          <keyword tid="663"><![CDATA[Department of Energy]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="627571">  <title><![CDATA[Diversity May Be Key to Reducing Errors in Quantum Computing ]]></title>  <uid>27303</uid>  <body><![CDATA[<p>In quantum computing, as in team building, a little diversity can help get the job done better, computer scientists have discovered.</p><p>Unlike conventional computers, the processing in quantum-based machines is noisy, which produces error rates dramatically higher than those of silicon-based computers. So quantum operations are repeated thousands of times to make the correct answer stands out statistically from all the wrong ones.</p><p>But running the same operation over and over again on the same qubit set may just generate the same incorrect answers that can appear statistically to be the correct answer. The solution, according to researchers at the Georgia institute of Technology, is to repeat the operation on different qubit sets that have different error signatures &ndash; and therefore won&rsquo;t produce the same correlated errors.</p><p>&ldquo;The idea here is to generate a diversity of errors so you are not seeing the same error again and again,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/moinuddin-k-qureshi">Moinuddin Qureshi,</a> a professor in Georgia Tech&rsquo;s <a href="https://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a>, who worked out the technique with his senior Ph.D. student, Swamit Tannu. &ldquo;Different qubits tend to have different error signatures. When you combine the results from diverse sets, the right answer appears even though each of them individually did not get the right answer,&rdquo; said Tannu.</p><p>Tannu compares the technique, known as Ensemble of Diverse Mappings (EDM), to the game show Who Wants to be a Millionaire. Contestants who aren&rsquo;t sure of the answer to a multiple choice question can ask the studio audience for help.</p><p>&ldquo;It&rsquo;s not necessary that the majority of the people in the audience know the right answer,&rdquo; Qureshi said. &ldquo;If even 20% know it, you can identify it. If the answers go equally in the four buckets from the people who don&rsquo;t know, the right answer will get 40% and you can select it even if only a relatively small number of people get it right.&rdquo;</p><p>Experiments with an existing Noisy Intermediate Scale Quantum (NISQ) computer showed that EDM improves the inference quality by 2.3 times compared to state-of-the-art mapping algorithms. By combining the output probability distributions of the diverse ensemble, EDM amplifies the correct answer by suppressing the incorrect ones.</p><p>The EDM technique, Tannu admits, is counterintuitive. Qubits can be ranked according to their error rate on specific types of problems, and the most logical course of action might be to use the set that&rsquo;s most accurate. But even the best qubits produce errors, and those errors are likely to be the same when the operation is done thousands of times.</p><p>Choosing qubits with different error rates &ndash; and therefore different types of error &ndash; guards against that by ensuring that the one correct answer will rise above the diversity of errors.</p><p>&ldquo;The goal of the research is to create several different versions of the program, each of which can make a mistake, but they will not make identical mistakes,&rdquo; Tannu explained. &ldquo;As long as they make diverse mistakes, when you average things out, the mistakes get canceled out and the right answer emerges.&rdquo;</p><p>Qureshi compares the EDM technique to team-building techniques promoted by human resource consultants.</p><p>&ldquo;If you form a team of experts with identical backgrounds, all of them may have the same blind spot,&rdquo; he said, adding a human dimension. &ldquo;If you want to make a team resilient to blind spots, collect a group of people who have different blind spots. As a whole, the team will be guarded against specific blind spots.&rdquo;</p><p>Error rates in conventional silicon-based computers are practically negligible, about one in a thousand-trillion operations, but today&rsquo;s NISQ quantum computers produce an error in a mere 100 operations.&nbsp;</p><p>&ldquo;These are really early-stage machines in which the devices have a lot of error,&rdquo; Qureshi said. &ldquo;That will likely improve over time, but because we are dependent on matter that has extremely low energy and lacks stability, we will never get the reliability we have come to expect with silicon. Quantum states are inherently about a single particle, but with silicon you are packing a lot of molecules together and averaging their activity.</p><p>&ldquo;If the hardware is inherently unreliable, we have to write software to make the most of it,&rdquo; he said. &ldquo;We have to take the hardware characteristics into account to make these unique machines useful.&rdquo;</p><p>The notion of running a quantum operation thousands of times to get what&rsquo;s likely to be the right answer at first seems counterproductive. But quantum computing is so much faster than conventional computing that nobody would object to doing a few thousand duplicate runs.</p><p>&ldquo;The objective with quantum computers is not to take a current program and run it faster,&rdquo; Qureshi said. &ldquo;Using quantum, we can solve problems that are virtually impossible to solve with even the fastest supercomputers. With several hundred qubits, which is beyond the current state of the art, we could solve problems that would take a thousand years with the fastest supercomputer.&rdquo;</p><p>Added Qureshi: &ldquo;You don&rsquo;t mind doing the computation a few thousand times to get an answer like that.&rdquo;</p><p>The quantum error mitigation scheme is scheduled to be presented on Oct. 14 at the 52nd Annual IEEE/ACM International Symposium on Microarchitecture. The work was supported by a gift from Microsoft.</p><p><strong>CITATION</strong>: Swamit S. Tannu and Moinuddin Qureshi, &ldquo;Ensemble of Diverse Mappings: Improving Reliability of Quantum Computers by Orchestrating Dissimilar Mistakes.&rdquo; (MICRO-52). <a href="https://dx.doi.org/10.1145/3352460.3358257">https://dx.doi.org/10.1145/3352460.3358257</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1571077608</created>  <gmt_created>2019-10-14 18:26:48</gmt_created>  <changed>1571077760</changed>  <gmt_changed>2019-10-14 18:29:20</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[In quantum computing, as in team building, a little diversity can help get the job done better, computer scientists have found.]]></teaser>  <type>news</type>  <sentence><![CDATA[In quantum computing, as in team building, a little diversity can help get the job done better, computer scientists have found.]]></sentence>  <summary><![CDATA[<p>In quantum computing, as in team building, a little diversity can help get the job done better. Computer science researchers have discovered that by expanding the diversity of errors made by the qubits being used for operations, they can increase the likelihood that the correct answer will emerge</p>]]></summary>  <dateline>2019-10-14T00:00:00-04:00</dateline>  <iso_dateline>2019-10-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-10-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>627569</item>          <item>627570</item>      </media>  <hg_media>          <item>          <nid>627569</nid>          <type>image</type>          <title><![CDATA[Quantum Computing and Error Diversity]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[qubit-allocator.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/qubit-allocator.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/qubit-allocator.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/qubit-allocator.jpg?itok=juZOPNZr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chart showing error diversity in quantum]]></image_alt>                    <created>1571077102</created>          <gmt_created>2019-10-14 18:18:22</gmt_created>          <changed>1571077102</changed>          <gmt_changed>2019-10-14 18:18:22</gmt_changed>      </item>          <item>          <nid>627570</nid>          <type>image</type>          <title><![CDATA[Quantum computing error mitigation researchers]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Swamit_Moin.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Swamit_Moin.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Swamit_Moin.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Swamit_Moin.jpg?itok=TAxIxLiJ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers working on quantum computing error mitigation]]></image_alt>                    <created>1571077209</created>          <gmt_created>2019-10-14 18:20:09</gmt_created>          <changed>1571077209</changed>          <gmt_changed>2019-10-14 18:20:09</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="182664"><![CDATA[quantum. quantum computing]]></keyword>          <keyword tid="3269"><![CDATA[error]]></keyword>          <keyword tid="736"><![CDATA[diversity]]></keyword>          <keyword tid="182665"><![CDATA[Ensemble of Diverse Mappings]]></keyword>          <keyword tid="168449"><![CDATA[edm]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="625614">  <title><![CDATA[Website Rates Security of Internet-Connected Devices]]></title>  <uid>27303</uid>  <body><![CDATA[<p>If you&rsquo;re in the market for an internet-connected garage door opener, doorbell, thermostat, security camera, yard irrigation system, slow cooker &mdash; or even a box of connected light bulbs &mdash; a new website can help you understand the security issues these shiny new devices might bring into your home.</p><p>Consumer-grade internet of things (IoT) devices aren&rsquo;t exactly known for having tight security practices. To save purchasers from finding that out the hard way, researchers from the Georgia Institute of Technology and the University of North Carolina at Chapel Hill have done security assessments of representative devices, awarding scores ranging from 28 (an F) up to 100.</p><p>Their site, <a href="https://yourthings.info">https://yourthings.info</a>, shows rankings for 45 devices, though a total of 74 have been evaluated. That&rsquo;s hardly a complete roundup of the tens of thousands of devices available, but the big idea behind the project is to help consumers understand important issues before connecting a new IoT helper to their home networks.</p><p>&ldquo;A lot of people who purchase these devices don&rsquo;t fully understand the risks associated with installing them in their homes,&rdquo; said Omar Alrawi, a graduate research assistant at Georgia Tech. &ldquo;We want to provide insight by providing security ratings for the devices we have tested.&rdquo;</p><p>Voice-activated personal digital assistants are among the most common home IoT devices, but if not properly installed, they can provide unwanted access to the home networks to which they are connected, warned <a href="https://www.ece.gatech.edu/faculty-staff-directory/manos-antonakakis">Manos Antonakakis</a>, a cybersecurity researcher and associate professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>.</p><p>&ldquo;If you have an IoT app that is vulnerable, whoever has access to that app not only has access to your personal information, but could also jump into your home and eavesdrop on your conversations,&rdquo; he said. &ldquo;Anything that is connected in the home in proximity to the personal assistant could also interact with it. If there is vulnerable software running on the device, it could be exploited within the home network.&rdquo;</p><p>One problem is that most home networks were set up for simple tasks like sharing printers, so they lack the kind of security controls found on enterprise systems at businesses, noted Chaz Lever, a research engineer in Georgia Tech&rsquo;s School of Electrical and Computer Engineering.</p><p>&ldquo;The home network is beginning to look a lot like enterprise networks with a range of services that have to be protected,&rdquo; Lever said. &ldquo;But the average consumer is not going to be equipped to do that. They don&rsquo;t have an IT staff that is doing audits and securing the devices. If these devices are not secure out of the box and there aren&rsquo;t easy ways to secure them, they can open the home up to a new vector of attacks.&rdquo;</p><p>To give consumers helpful advice, the researchers developed a framework for analyzing the devices&rsquo; security components. In what is believed to be the first effort to objectively assess the risks of IoT equipment, they examined the devices themselves, how the devices communicate with cloud servers, the applications running on the devices, and the cloud-based endpoints.</p><p>&ldquo;The more services running on the device, the higher the probability that some of them will be vulnerable to attack,&rdquo; Antonakakis said. &ldquo;Providing many services may be attractive from a marketing perspective, but if you have multiple services, the risk increases.&rdquo;</p><p>In their study of IoT devices, the researchers found wide variations in security depending on the manufacturer. In some cases, equipment made by small and lesser-known companies performed better than devices made by larger companies.</p><p>&ldquo;There are some devices that do security really well, and other manufacturers should learn from those exemplary devices,&rdquo; Alrawi said. &ldquo;We saw the full spectrum of good and bad, and sometimes we were surprised at the results of our evaluation.&rdquo;</p><p>Because they are designed to be installed by consumers, these IoT devices must be easy to use. But ease of use can be the enemy of security. An example is a service known as UPnP, which makes devices known to the network during installation so communications can be established.</p><p>But a device announcing itself on the network can attract attackers, Lever noted. &ldquo;It&rsquo;s helpful for the devices to communicate what they do, but that opens up vulnerabilities. The choice of protocols affects not only the device, but also the security of the network on which it is running.&rdquo;</p><p>Internet-connected light bulbs are unlikely to have a long service life, but that&rsquo;s not the case with expensive appliances like internet-connected refrigerators. Antonakakis worries that these devices could become security risks without regular updates.</p><p>&ldquo;Ideally, the consumer shouldn&rsquo;t have to be aware that their refrigerator needs updates that have to be downloaded to the device,&rdquo; he said. &ldquo;We want that to happen automatically and securely. Why should anyone have to know how to patch their refrigerator?&rdquo;</p><p>While the notion of hacking a slow cooker might seem amusing, the devices have heating elements that could cause a fire if a malicious actor turned up the temperature. Attacks can also affect more than a homeowner. In 2016, the Mirai botnet took advantage of unsecured internet-connected cameras &mdash; many of them baby monitors &mdash; to create a massive distributed denial of service attack that left much of the internet unavailable.</p><p>Beyond educating consumers, the researchers hope to encourage better security by device manufacturers by tracking security trends over time.</p><p>&ldquo;We hope to inspire both technical and policy next steps,&rdquo; said Antonakakis. &ldquo;There is a need for establishing policy and standards. We want to raise the security level of all these devices. There is a lot more that could be done.&rdquo;</p><p>In addition to those already mentioned, Fabrian Monrose from the University of North Carolina at Chapel Hill was also a member of the research team.</p><p><em>This material is based upon work supported in part by U.S. Department of Commerce grants 2106DEK and 2106DZD, by National Science Foundation grant 2106DGX, and by Air Force Research Laboratory/Defense Advanced Research Projects Agency grants 2106DTX and 2106EHP. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1567617631</created>  <gmt_created>2019-09-04 17:20:31</gmt_created>  <changed>1567618057</changed>  <gmt_changed>2019-09-04 17:27:37</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new website can help consumers understand the security challenges of internet-connected devices.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new website can help consumers understand the security challenges of internet-connected devices.]]></sentence>  <summary><![CDATA[<p>If you&rsquo;re in the market for an internet-connected garage door opener, doorbell, thermostat, security camera, yard irrigation system, slow cooker &mdash; or even a box of connected light bulbs &mdash; a new website can help you understand the security issues these shiny new devices might bring into your home.</p>]]></summary>  <dateline>2019-09-04T00:00:00-04:00</dateline>  <iso_dateline>2019-09-04T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-09-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>625604</item>          <item>625605</item>      </media>  <hg_media>          <item>          <nid>625604</nid>          <type>image</type>          <title><![CDATA[Internet-connected cameras]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[iot-security-006.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/iot-security-006.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iot-security-006.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/iot-security-006.jpg?itok=vYR4bTvZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Row of internet-connected cameras]]></image_alt>                    <created>1567617020</created>          <gmt_created>2019-09-04 17:10:20</gmt_created>          <changed>1567617020</changed>          <gmt_changed>2019-09-04 17:10:20</gmt_changed>      </item>          <item>          <nid>625605</nid>          <type>image</type>          <title><![CDATA[IoT security researchers]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[iot-security-013.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/iot-security-013.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iot-security-013.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/iot-security-013.jpg?itok=SX-SVNDD]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Research team in security lab]]></image_alt>                    <created>1567617137</created>          <gmt_created>2019-09-04 17:12:17</gmt_created>          <changed>1567617137</changed>          <gmt_changed>2019-09-04 17:12:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="2229"><![CDATA[Internet]]></keyword>          <keyword tid="64421"><![CDATA[Internet-of-Things]]></keyword>          <keyword tid="173795"><![CDATA[Manos Antonakakis]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="624388">  <title><![CDATA[Smartphone Apps May Connect to Vulnerable Backend Cloud Servers]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don&rsquo;t even know exists.</p><p>In research to be reported August 15 at the 2019 USENIX Security Symposium, researchers from the Georgia Institute of Technology and The Ohio State University identified more than 1,600 vulnerabilities in the support ecosystem behind the top 5,000 free apps available in the Google Play Store. The vulnerabilities, affecting multiple app categories, could allow hackers to break into databases that include personal information &ndash; and perhaps into users&rsquo; mobile devices.</p><p>To help developers improve the security of their mobile apps, the researchers have created an automated system called SkyWalker to vet the cloud servers and software library systems. SkyWalker can examine the security of the servers supporting mobile applications, which are often operated by cloud hosting services rather than individual app developers.</p><p>&ldquo;A lot of people might be surprised to learn that their phone apps are communicating with not just one, but likely tens or even hundreds of servers in the cloud,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/brendan-d-saltaformaggio">Brendan Saltaformaggio,</a> an assistant professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>. &ldquo;Users don&rsquo;t know they are communicating with these servers because only the apps interact with them and they do so in the background. Until now, that has been a blind spot where nobody was looking for vulnerabilities.&rdquo;</p><p>The Air Force Office of Scientific Research and the National Science Foundation supported the research.</p><p>In their study, the researchers discovered 983 instances of known vulnerabilities and another 655 instances of zero-day vulnerabilities spanning across the software layers &ndash; operating systems, software services, communications modules and web apps &ndash; of the cloud-based systems supporting the apps. The researchers are still investigating whether attackers could get into individual mobile devices connected to vulnerable servers.</p><p>&ldquo;These vulnerabilities affect the servers that are in the cloud, and once an attacker gets on the server, there are many ways they can attack,&rdquo; Saltaformaggio said. &ldquo;It&rsquo;s a whole new question whether or not they can jump from the server to a user&rsquo;s device, but our preliminary research on that is very concerning.&rdquo;</p><p>The researchers identified three types of attack that could be made on the backend servers: SQL injection, XML external entity and cross-site scripting, explained Omar Alrawi, a Georgia Tech graduate research assistant and co-first author with Chaoshun Zuo at Ohio State. By taking control of these machines in the cloud, attackers could gain access to personal data, delete or alter information or even redirect financial transactions to deposit funds in their own accounts.&nbsp;</p><p>To study the system, Alrawi and Zuo ran applications in a controlled environment on a mobile device that connected to backend servers. They then watched the communications between the device and servers, and repeated the process for all of the applications studied.</p><p>&ldquo;We found that a lot of applications don&rsquo;t encrypt the communications between the mobile app and the cloud service, so an attacker that is between the two points or on the same network as the mobile could get information about the user &ndash; their location and user name &ndash; and potentially execute password resets,&rdquo; Alrawi said.</p><p>The vulnerabilities were not easy to spot. &ldquo;You have to understand the context through which the app communicates with the cloud server,&rdquo; he said. &ldquo;These are very deep bugs that cannot be identified by simply scanning and using traditional tools that are used for web application security.&rdquo;</p><p>The operators of vulnerable systems were notified of the findings. Concerns about who is responsible for securing those backend servers is one of the issues to come out of the study.&nbsp;</p><p>&ldquo;It&rsquo;s actually a significant problem because of how many different software developers may have their hands in building these cloud servers,&rdquo; Saltaformaggio said. &ldquo;It&rsquo;s not always clear who is responsible for doing the patching and who is responsible for the vulnerabilities. It&rsquo;s tough to track down these vulnerabilities, but it&rsquo;s also tough to get them patched.&rdquo;</p><p>To save app developers from having to do the security research they did, the researchers are offering SkyWalker, an analysis pipeline to study mobile backends. Developers will be able to submit their apps to SkyWalker at <a href="https://mobilebackend.vet">https://mobilebackend.vet</a> and get a report on what it finds.&nbsp;</p><p>&ldquo;SkyWalker will watch how the application communicates with those cloud servers, and then it will try to communicate with the servers to find vulnerabilities,&rdquo; said Alrawi. &ldquo;This information can give an app developer a heads-up about potential problems before they make their application public.&rdquo;</p><p>The researchers studied only applications in the Google Play Store. But applications designed for iOS may share the same backend systems.</p><p>&ldquo;These servers provide backend services for mobile apps that any device could use,&rdquo; Alrawi said. &ldquo;These cloud services are essential components of modern mobile apps. They are part of the always-connected world.&rdquo;</p><p>For the future, the researchers hope to study how the vulnerabilities could affect smartphone users, and to check on whether the problems they identified have been addressed.</p><p>&ldquo;We are going to keep doing these sorts of studies and will revisit them later to see how the attack landscape has improved,&rdquo; said Saltaformaggio. &ldquo;We will keep looking for more blind spots that need to be studied. In the new world of smartphones and mobile applications, there are unique problems that need to be rooted out.&rdquo;</p><p>In addition to those already mentioned, the research team included Ruian Duan and Ranjita Pai Kasturi from Georgia Tech and Zhiqiang Lin from Ohio State.</p><p><em>This work was partially supported by the Air Force Office of Scientific Research (AFOSR) under grant FA9550-14-1-0119 and by National Science Foundation (NSF) awards 1834215 and 1834216. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsoring organizations.</em></p><p><strong>CITATION</strong>: Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin&nbsp;and Brendan Saltaformaggio,&nbsp;&ldquo;The Betrayal at Cloud City: An Empirical Analysis of Cloud-Based Mobile Backends,&rdquo; 2019 USENIX Security Symposium. <a href="https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi">https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1565655257</created>  <gmt_created>2019-08-13 00:14:17</gmt_created>  <changed>1565969134</changed>  <gmt_changed>2019-08-16 15:25:34</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications.]]></teaser>  <type>news</type>  <sentence><![CDATA[Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications.]]></sentence>  <summary><![CDATA[<p>Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don&rsquo;t even know exists.</p>]]></summary>  <dateline>2019-08-12T00:00:00-04:00</dateline>  <iso_dateline>2019-08-12T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-08-12 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>624386</item>          <item>624387</item>      </media>  <hg_media>          <item>          <nid>624386</nid>          <type>image</type>          <title><![CDATA[Schematic of SkyWalker]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[skywalker_1742.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/images/skywalker_1742.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/skywalker_1742.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/skywalker_1742.JPG?itok=jobVx1xZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Partial schematic of SkyWalker]]></image_alt>                    <created>1565654515</created>          <gmt_created>2019-08-13 00:01:55</gmt_created>          <changed>1565654515</changed>          <gmt_changed>2019-08-13 00:01:55</gmt_changed>      </item>          <item>          <nid>624387</nid>          <type>image</type>          <title><![CDATA[Vulnerable apps by genre]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[vulnerabilities_1750.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/vulnerabilities_1750.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/vulnerabilities_1750.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/vulnerabilities_1750.jpg?itok=SoM3cx86]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Breakdown of vulnerable apps by genre]]></image_alt>                    <created>1565654655</created>          <gmt_created>2019-08-13 00:04:15</gmt_created>          <changed>1565654655</changed>          <gmt_changed>2019-08-13 00:04:15</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="173634"><![CDATA[vulnerability]]></keyword>          <keyword tid="181983"><![CDATA[server]]></keyword>          <keyword tid="181984"><![CDATA[cloud server]]></keyword>          <keyword tid="181985"><![CDATA[backend]]></keyword>          <keyword tid="10553"><![CDATA[app]]></keyword>          <keyword tid="181988"><![CDATA[SkyWalker]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="624602">  <title><![CDATA[When Human Expertise Improves the Work of Machines]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Machine learning algorithms can sometimes do a better job with a little help from human expertise, at least in the field of materials science.</p><p>In many specialized areas of science, engineering and medicine, researchers are turning to machine learning algorithms to analyze data sets that have grown much too large for humans to understand. In materials science, success with this effort could accelerate the design of next-generation advanced functional materials, where development now depends on old-fashioned trial-and-error.</p><p>By themselves, however, data analytics techniques borrowed from other research areas often fail to provide the insights needed to help materials scientists and engineers choose which of many variables to adjust &mdash; and can&rsquo;t account for dramatic changes such as the introduction of a new chemical compound into the process. In some complex materials such as ferroelectrics, as many as 10 different factors can affect the properties of the resulting product.</p><p>In a paper published this week in the journal <em>NPJ Computational Materials</em>, researchers explain how to give the machines an edge at solving the challenge by intelligently organizing the data to be analyzed based on human knowledge of what factors are likely to be important and related. Known as dimensional stacking, the technique shows that human experience still has a role to play in the age of machine intelligence.</p><p>The research was sponsored by the National Science Foundation and the Defense Threat Reduction Agency, as well as the Swiss National Science Foundation. Measurements were performed, in part, at the Oak Ridge National Laboratory in Oak Ridge, Tennessee.</p><p>&ldquo;When your machine accepts strings of data, it really does matter how you are putting those strings together,&rdquo; said <a href="http://www.me.gatech.edu/faculty/bassiri_gharb">Nazanin Bassiri-Gharb</a>, the paper&rsquo;s corresponding author and a professor in the <a href="http://www.me.gatech.edu">George W. Woodruff School of Mechanical Engineering</a> at the Georgia Institute of Technology. &ldquo;We must be mindful that the organization of data before it goes to the algorithm makes a difference. If you don&rsquo;t plug the information in correctly, you will get a result that isn&rsquo;t necessarily correlated with the reality of the physics and chemistry that govern the materials.&rdquo;</p><p>Bassiri-Gharb works on ferroelectrics, crystalline materials that exhibit spontaneous electrical polarizations switchable by an external electric field. Widely used for their piezoelectric properties &mdash; which allow electrical inputs to generate mechanical outputs, and mechanical motion to generate electrical voltages &mdash; their chemical formulas are usually complicated, including lead, manganese, niobium, oxygen, titanium, indium, bismuth and other elements.</p><p>Researchers, who have been working for decades to improve the materials, would like to develop advanced ferroelectrics that don&rsquo;t include lead. But trial-and-error design techniques haven&rsquo;t led to major breakthroughs, and she is not alone in wanting a more direct approach &mdash; one that could also more rapidly lead to improvements in other functional materials used in microelectronics, batteries, optoelectronic systems and other critical research fields.</p><p>&ldquo;For materials science, things get really complicated, especially with the functional materials,&rdquo; said Bassiri-Gharb. &ldquo;As materials scientists, it&rsquo;s very difficult to design the materials if we don&rsquo;t understand why a response is increased. We have learned that the functionalities are not compartmentalized. They are interrelated among many properties of the material.&rdquo;</p><p>The technique described in the paper involves a preprocessing step in which the large data sets are organized according to physical or chemical properties that make sense to material scientists.</p><p>&ldquo;As a scientist or engineer, you have an idea whether or not there are physical or chemical correlations,&rdquo; she explained. &ldquo;You have to be cognizant of what kind of correlations could exist. The way you stack your data to be analyzed would have implications with respect to the physical or chemical correlations. If you do this correctly, you can get more information from any data analytics approach you might be using.&rdquo;</p><p>To test the techniques, Bassiri-Gharb and collaborators Lee Griffin, Iaroslav Gaponenko, and Shujun Zhang tested samples of relaxor-ferroelectric materials used in advanced ultrasonic imaging equipment. Griffin, a Georgia Tech graduate research assistant and the paper&rsquo;s co-first author, did the experimental measurements. Zhang, a researcher at the University of Wollongong in Australia, provided samples for the study. Bassiri-Gharb and Gaponenko, a research affiliate in her group, developed the approach.</p><p>Using a conductive tip on an atomic force microscope, they examined the electromechanical response from a series of chemically related samples, generating as many as 2,500 time- and voltage-dependent measurements on a grid of points established on each sample. The process generated hundreds of thousands of data points and provided a good test for the stacking approach, known technically as concatenation.</p><p>&ldquo;Instead of just looking at the chemical composition that provides the highest response, we looked at a range of compositions and tried to figure out the commonality,&rdquo; she said. &ldquo;We figured out that if we applied this data stacking with some thought process behind it, we could learn more about these interesting materials.&rdquo;</p><p>Among their findings: Though the material is a single crystal, the functional response showed highly disordered behavior, reminiscent of a fully disordered material like glass. &ldquo;This glassy behavior really is unexpectedly persisting beyond a small percentage of the material compositions,&rdquo; said Bassiri-Gharb. &ldquo;It is persisting across all of the compositions that we have looked at.&rdquo;</p><p>She hopes the technique will ultimately lead to information that will improve many materials and their functionalities. Knowing which chemicals need to be included could allow the materials scientists to move to the next phase &mdash; working with chemists to put the right atoms in the right places.</p><p>&ldquo;The big goal for any materials&rsquo; functionality is to find the guidelines that will provide the properties we want,&rdquo; she said. &ldquo;We want to find the straight path to the best compositions for the next generation of these materials.&rdquo;</p><p><em>This research was supported by the National Science Foundation (NSF) through award DMR-1255379, by the Defense Threat Reduction Agency (DTRA) though grant HDTRA1-15-0035, by the Center for the Science and Technology of Advanced Materials and Interfaces (STAMI) at Georgia Tech, and Division II of the Swiss National Science Foundation under project 200021_178782. The piezo-response measurements were in part performed at the Center for Nanophase Materials Sciences at Oak Ridge National Laboratory, which is a U.S. Department of Energy Office of Science User Facility. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsoring organizations.</em></p><p><strong>CITATION</strong>: Lee A. Griffin, et al., &ldquo;Smart machine learning or discovering meaningful physical and chemical contributions through dimensional stacking&rdquo; (<em>NPJ Computational Materials</em>, 2019, <a href="https://rdcu.be/bOycU">https://rdcu.be/bOycU</a>).</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon&nbsp;</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1565915407</created>  <gmt_created>2019-08-16 00:30:07</gmt_created>  <changed>1565915462</changed>  <gmt_changed>2019-08-16 00:31:02</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Machine learning algorithms can sometimes do a better job with a little help from human expertise.]]></teaser>  <type>news</type>  <sentence><![CDATA[Machine learning algorithms can sometimes do a better job with a little help from human expertise.]]></sentence>  <summary><![CDATA[<p>Machine learning algorithms can sometimes do a better job with a little help from human expertise, at least in the field of materials science.</p>]]></summary>  <dateline>2019-08-15T00:00:00-04:00</dateline>  <iso_dateline>2019-08-15T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-08-15 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>624601</item>          <item>624600</item>          <item>624599</item>      </media>  <hg_media>          <item>          <nid>624601</nid>          <type>image</type>          <title><![CDATA[Atomic Force Microscope Analysis - 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[data-stacking3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/data-stacking3.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/data-stacking3.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/data-stacking3.jpg?itok=RCxHhV8T]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Atomic force microscope analysis]]></image_alt>                    <created>1565914820</created>          <gmt_created>2019-08-16 00:20:20</gmt_created>          <changed>1565914820</changed>          <gmt_changed>2019-08-16 00:20:20</gmt_changed>      </item>          <item>          <nid>624600</nid>          <type>image</type>          <title><![CDATA[Atomic Force Microscope Analysis]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[data-stacking4.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/data-stacking4.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/data-stacking4.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/data-stacking4.jpg?itok=9NV2ExS7]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Atomic force microscope analysis]]></image_alt>                    <created>1565914692</created>          <gmt_created>2019-08-16 00:18:12</gmt_created>          <changed>1565914692</changed>          <gmt_changed>2019-08-16 00:18:12</gmt_changed>      </item>          <item>          <nid>624599</nid>          <type>image</type>          <title><![CDATA[Single Crystal Response]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[data-stacking2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/data-stacking2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/data-stacking2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/data-stacking2.jpg?itok=9-z-XW8C]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Studying the response of a single crystal]]></image_alt>                    <created>1565914531</created>          <gmt_created>2019-08-16 00:15:31</gmt_created>          <changed>1565914531</changed>          <gmt_changed>2019-08-16 00:15:31</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="217141"><![CDATA[Georgia Tech Materials Institute]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="13685"><![CDATA[ferroelectric]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="1692"><![CDATA[materials]]></keyword>          <keyword tid="182025"><![CDATA[atomic force microscope]]></keyword>          <keyword tid="7251"><![CDATA[analytics]]></keyword>          <keyword tid="13686"><![CDATA[Nazanin Bassiri-Gharb]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="623759">  <title><![CDATA[Hackers Could Use Connected Cars to Gridlock Whole Cities]]></title>  <uid>31759</uid>  <body><![CDATA[<p>In the year 2026, at rush hour, your self-driving car abruptly shuts down right where it blocks traffic. You climb out to see gridlock down every street in view, then a news alert on your watch tells you that hackers have paralyzed all Manhattan traffic by randomly stranding internet-connected cars.</p><p>Flashback to July 2019, the dawn of autonomous vehicles and other connected cars, and physicists at the Georgia Institute of Technology and Multiscale Systems, Inc. have applied physics <a href="https://journals.aps.org/pre/abstract/10.1103/PhysRevE.100.012316" target="_blank"><strong>in a new study</strong></a> to simulate what it would take for future hackers to wreak exactly this widespread havoc by randomly stranding these cars. The researchers want to expand the current discussion on automotive cybersecurity, which mainly focuses on hacks that could <a href="https://money.cnn.com/technology/our-driverless-future/keep-hackers-out-of-your-driverless-car/" target="_blank">crash one car</a> or run over one pedestrian, to include potential mass mayhem.</p><p>They warn that even with increasingly tighter cyber defenses, the amount of data breached has soared in the past four years, but objects becoming hackable can convert the rising cyber threat into a potential physical menace.</p><p>&ldquo;Unlike most of the data breaches we hear about, hacked cars have physical consequences,&rdquo; said Peter Yunker, who co-led the study and is an&nbsp;<a href="https://www.physics.gatech.edu/user/peter-yunker" rel="noopener noreferrer" target="_blank">assistant professor in Georgia Tech&rsquo;s School of Physics</a>.</p><p>It may not be that hard for state, terroristic, or mischievous actors to commandeer parts of the internet of things, <a href="https://www.spectator.co.uk/2018/07/the-dream-of-driverless-cars-is-dying/" target="_blank">including cars</a>.</p><p>&ldquo;With cars, one of the worrying things is that currently there is effectively one central computing system, and a lot runs through it. You don&rsquo;t necessarily have separate systems to run your car and run your satellite radio. If you can get into one, you may be able to get into the other,&rdquo; said Jesse Silverberg of Multiscale Systems, Inc., who co-led the study with Yunker&nbsp;</p><h4><strong>Freezing traffic solid</strong></h4><p>In simulations of hacking internet-connected cars, the researchers froze traffic in Manhattan nearly solid, and it would not even take that to wreak havoc. Here are their results, and the numbers are conservative for reasons mentioned below.</p><p>&ldquo;Randomly stalling 20 percent of cars during rush hour would mean total traffic freeze. At 20 percent, the city has been broken up into small islands, where you may be able to inch around a few blocks, but no one would be able to move across town,&rdquo; said David Yanni, a graduate research assistant in Yunker&rsquo;s lab.</p><p>Not all cars on the road would have to be connected, just enough for hackers to stall 20 percent of all cars on the road. For example, if 40 percent of all cars on the road were connected, hacking half would suffice.</p><p>Hacking 10 percent of all cars at rush hour would debilitate traffic enough to prevent emergency vehicles from expediently cutting through traffic that is inching along citywide. The same thing would happen with a 20 percent hack during intermediate daytime traffic.</p><p>The researchers&rsquo; results appear <a href="https://journals.aps.org/pre/abstract/10.1103/PhysRevE.100.012316" target="_blank">in the journal&nbsp;<em>Physical Review E</em>&nbsp;on July 20, 2019</a>. The study is not embargoed.</p><p><sup><strong><em>[Ready for graduate school?&nbsp;<a href="http://www.gradadmiss.gatech.edu/apply-now" target="_blank">Here&#39;s how to apply to Georgia Tech.</a>]&nbsp;</em></strong></sup></p><h4><strong>It could take less</strong></h4><p>For the city to be safe, hacking damage would have to be below that. In other cities, things could be worse.</p><p>&ldquo;Manhattan has a nice grid, and that makes traffic more efficient. Looking at cities without large grids like Atlanta, Boston, or Los Angeles, and we think hackers could do worse harm because a grid makes you more robust with redundancies to get to the same places down many different routes,&rdquo; Yunker said.</p><p>The researchers left out factors that would likely worsen hacking damage, thus a real-world hack may require stalling even fewer cars to shut down Manhattan.</p><p>&ldquo;I want to emphasize that we only considered static situations &ndash; if roads are blocked or not blocked. In many cases, blocked roads spill over traffic into other roads, which we also did not include. If we were to factor in these other things, the number of cars you&rsquo;d have to stall would likely drop down significantly,&rdquo; Yunker said.</p><p>The researchers also did not factor in ensuing public panic nor car occupants becoming pedestrians that would further block streets or cause accidents. Nor did they consider hacks that would target cars at locations that maximize trouble.</p><p>They also stress that they are not cybersecurity experts, nor are they saying anything about the likelihood of someone carrying out such a hack. They simply want to give security experts a calculable idea of the scale of a hack that would shut a city down.</p><p>The researchers do have some general ideas of how to reduce the potential damage.</p><p>&ldquo;Split up the digital network influencing the cars to make it impossible to access too many cars through one network,&rdquo; said lead author Skanka Vivek, a postdoctoral researcher in Yunker&rsquo;s lab. &ldquo;If you could also make sure that cars next to each other can&rsquo;t be hacked at the same time that would decrease the risk of them blocking off traffic together.&rdquo;</p><h4><strong>Traffic jams as physics</strong></h4><p>Yunker researches in soft matter physics, which looks at how constituent parts &ndash; in this case, connected cars &ndash; act as one whole physical phenomenon. The research team analyzed the movements of cars on streets with varying numbers of lanes, including how they get around stalled vehicles and found they could apply a physics approach to what they observed.</p><p>&ldquo;Whether traffic is halted or not can be explained by classic percolation theory used in many different fields of physics and mathematics,&rdquo; Yunker said.</p><p><a href="https://en.wikipedia.org/wiki/Percolation_theory" rel="noopener noreferrer" target="_blank">Percolation theory</a>&nbsp;is often used in materials science to determine if a desirable quality like a specific rigidity will spread throughout a material to make the final product uniformly stable. In this case, stalled cars spread to make formerly flowing streets rigid and stuck.</p><p>The shut streets would be only those in which hacked cars have cut off all lanes or in which they have become hindrances that other cars can&rsquo;t maneuver around and do not include streets where hacked cars still allow traffic flow.</p><p>The researchers chose Manhattan for their simulations because a lot of data was available on that city&rsquo;s traffic patterns.</p><p><strong>Also READ: <a href="http://www.rh.gatech.edu/features/connected-new-world" target="_blank">Georgia Tech&#39;s cybersecurity researchers tackle the&nbsp;internet of things&nbsp;</a></strong></p><p><em>The study was coauthored by Skanda Vivek and David Yanni of Georgia Tech and Jesse Silverberg of Multiscale Systems, Inc. Any findings, conclusions, and recommendations are those of the authors.</em></p><p><strong>Writer &amp;&nbsp;Media Representative</strong>: Ben Brumfield (404-660-1408), email:&nbsp;<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a></p><p><strong>Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p>]]></body>  <author>Ben Brumfield</author>  <status>1</status>  <created>1564413609</created>  <gmt_created>2019-07-29 15:20:09</gmt_created>  <changed>1564678483</changed>  <gmt_changed>2019-08-01 16:54:43</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Hackers could gridlock whole cities by stalling out a limited percentage of self-driving and other connected vehicles.]]></teaser>  <type>news</type>  <sentence><![CDATA[Hackers could gridlock whole cities by stalling out a limited percentage of self-driving and other connected vehicles.]]></sentence>  <summary><![CDATA[<p>In a future where&nbsp;self-driving and other internet-connected cars share the roads with the rest of us, hackers could not only wreck the occasional vehicle but possibly compound attacks to gridlock whole cities by stalling out a limited percentage of connected cars. Physicists calculated how many stalled cars would cause how much mayhem.</p>]]></summary>  <dateline>2019-07-29T00:00:00-04:00</dateline>  <iso_dateline>2019-07-29T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-07-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>623747</item>          <item>623752</item>          <item>623754</item>          <item>623760</item>          <item>623757</item>          <item>623758</item>      </media>  <hg_media>          <item>          <nid>623747</nid>          <type>image</type>          <title><![CDATA[Manhattan gridlock]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[New_York_City_Gridlock.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/New_York_City_Gridlock.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/New_York_City_Gridlock.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/New_York_City_Gridlock.jpg?itok=HwxP1mSo]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1564409967</created>          <gmt_created>2019-07-29 14:19:27</gmt_created>          <changed>1564409967</changed>          <gmt_changed>2019-07-29 14:19:27</gmt_changed>      </item>          <item>          <nid>623752</nid>          <type>image</type>          <title><![CDATA[Gridlock Manhattan]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[New_York_City_Gridlock.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/New_York_City_Gridlock_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/New_York_City_Gridlock_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/New_York_City_Gridlock_0.jpg?itok=vB8XFTwL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1564410856</created>          <gmt_created>2019-07-29 14:34:16</gmt_created>          <changed>1564410856</changed>          <gmt_changed>2019-07-29 14:34:16</gmt_changed>      </item>          <item>          <nid>623754</nid>          <type>image</type>          <title><![CDATA[Stranded connected cars block traffic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[blocking.scenario.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/blocking.scenario.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/blocking.scenario.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/blocking.scenario.jpg?itok=2_DICA1c]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1564411039</created>          <gmt_created>2019-07-29 14:37:19</gmt_created>          <changed>1564411039</changed>          <gmt_changed>2019-07-29 14:37:19</gmt_changed>      </item>          <item>          <nid>623760</nid>          <type>image</type>          <title><![CDATA[Hacked Manhattan grid maps]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Manhattan.hacked.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Manhattan.hacked.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Manhattan.hacked.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Manhattan.hacked.jpg?itok=NT0qnHBC]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1564414826</created>          <gmt_created>2019-07-29 15:40:26</gmt_created>          <changed>1564414826</changed>          <gmt_changed>2019-07-29 15:40:26</gmt_changed>      </item>          <item>          <nid>623757</nid>          <type>image</type>          <title><![CDATA[Gridlock math]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[selfdriving.equation.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/selfdriving.equation.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/selfdriving.equation.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/selfdriving.equation.png?itok=Or3xn6xO]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1564412526</created>          <gmt_created>2019-07-29 15:02:06</gmt_created>          <changed>1564412526</changed>          <gmt_changed>2019-07-29 15:02:06</gmt_changed>      </item>          <item>          <nid>623758</nid>          <type>image</type>          <title><![CDATA[Peter Yunker looking at territorial cholera strains]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Yunker.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Yunker.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Yunker.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Yunker.jpg?itok=wyuTeKL1]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1564412886</created>          <gmt_created>2019-07-29 15:08:06</gmt_created>          <changed>1564412886</changed>          <gmt_changed>2019-07-29 15:08:06</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="126011"><![CDATA[School of Physics]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="171930"><![CDATA[self-driving]]></keyword>          <keyword tid="169008"><![CDATA[self-driving cars]]></keyword>          <keyword tid="181813"><![CDATA[self-driving car]]></keyword>          <keyword tid="181814"><![CDATA[self-driving simulation]]></keyword>          <keyword tid="98601"><![CDATA[hacking]]></keyword>          <keyword tid="181815"><![CDATA[Hackers]]></keyword>          <keyword tid="181816"><![CDATA[Percolation]]></keyword>          <keyword tid="181817"><![CDATA[percolation threshhold]]></keyword>          <keyword tid="167045"><![CDATA[simulation]]></keyword>          <keyword tid="181818"><![CDATA[cybersceurity]]></keyword>          <keyword tid="2200"><![CDATA[Cyber Attack]]></keyword>          <keyword tid="10840"><![CDATA[cyber attacks]]></keyword>          <keyword tid="181819"><![CDATA[cyber breaches]]></keyword>          <keyword tid="181820"><![CDATA[cyber campaigns]]></keyword>          <keyword tid="960"><![CDATA[physics]]></keyword>          <keyword tid="167858"><![CDATA[soft matter]]></keyword>          <keyword tid="181821"><![CDATA[soft matter physics]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39471"><![CDATA[Materials]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="622803">  <title><![CDATA[Georgia Tech Names Director for Georgia Tech Research Institute (GTRI)]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The Georgia Institute of Technology has named James J. Hudgens to be the new director of the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI), Georgia Tech&rsquo;s applied research division. Currently director of the Threat Intelligence Center (TIC) at Sandia National Laboratories in Albuquerque, New Mexico, Hudgens will become a Georgia Tech senior vice president and GTRI&rsquo;s director effective September 2, 2019.</p><p>Hudgens holds a Ph.D. in ceramic engineering from Iowa State University. He has led research and development programs in national security, cybersecurity, quantum information science, and photonic microsystems. He also led programs in data analytics, synthetic aperture radar, and airborne intelligence, surveillance and reconnaissance (ISR) systems before becoming director of the $265 million-per-year TIC, which has a staff of 550 professionals working in six states and 136 different laboratories.&nbsp;</p><p>A senior technology executive with 23 years of experience in national security research, Hudgens has also held positions at optical networking firm Mahi Networks, defense contractor Raytheon Electronic Systems, and semiconductor company Texas Instruments. In 2013, he won the Department of Energy Secretary&rsquo;s Honor Award for Achievement for leading the Copperhead counter-IED program.</p><p>&ldquo;Jim Hudgens has extensive experience building and leading federally sponsored programs that are at the center of GTRI&rsquo;s core research areas,&rdquo; said <a href="http://www.research.gatech.edu/meet-dr-chaouki-t-abdallah">Chaouki Abdallah</a>, Georgia Tech&rsquo;s Executive Vice President for Research. &ldquo;His experience developing and managing programs at Sandia National Laboratories and major private-sector defense contractors will support GTRI&rsquo;s continued growth in service to our nation&rsquo;s defense agencies and other important state and federal sponsors.&rdquo;</p><p>GTRI has more than 2,300 employees conducting nearly $500 million worth of research across a broad range of technology areas that focus on solving critical challenges for government and industry sponsors. GTRI is one of the world&rsquo;s leading applied research and development organizations, and is an integral part of Georgia Tech&rsquo;s research program.</p><p>&ldquo;Georgia Tech, through GTRI, is entrusted with a vital role in our national security,&rdquo; Hudgens said. &ldquo;I know firsthand that GTRI and other Georgia Tech researchers are known for the exceptional quality of their work in delivering innovative solutions to the most complex national security challenges.</p><p>&ldquo;It is a great privilege for me to join the combined University System of Georgia and Georgia Tech family to develop a shared vision for how we will build on this reputation to advance one of the nation&rsquo;s leading technological research universities,&rdquo; he added. &ldquo;I thank Georgia Tech President G.P. &ldquo;Bud&rdquo; Peterson, Provost Rafael Bras, and Executive Vice President Abdallah for the honor of becoming part of GTRI&rsquo;s 85-year legacy of service to the state of Georgia and our nation.&rdquo;</p><p>In congratulating Hudgens, Peterson emphasized GTRI&rsquo;s important role in the nation, region, state &ndash; and Georgia Tech itself.</p><p>&ldquo;For decades, the U.S. government and industry have looked to Georgia Tech &ndash; in particular GTRI &ndash; as they seek to find and develop effective, creative solutions in national security and other mission-critical areas,&rdquo; Peterson said. &ldquo;We are pleased to welcome Jim Hudgens to lead one of Georgia Tech&rsquo;s most important missions in support of our nation, region, and state.&rdquo;</p><p>Hudgens&rsquo; selection came after a five-month national search during which he was one of four finalists to make presentations to Georgia Tech faculty and staff.</p><p><a href="http://www.sandia.gov">Sandia National Laboratories</a> is a multi-mission laboratory operated for the U.S. Department of Energy&rsquo;s National Nuclear Security Administration. Sandia has major research and development responsibilities in nuclear deterrence, global security, defense, energy technologies, and economic competitiveness, with main facilities in Albuquerque, New Mexico, and Livermore, California. Sandia is the largest of the country&rsquo;s 17 national laboratories.</p><p>GTRI conducts research through eight laboratories located on Georgia Tech&rsquo;s midtown Atlanta campus, in a research facility near Dobbins Air Reserve Base in Smyrna, Georgia, and in Huntsville, Alabama. GTRI also has more than a dozen locations around the nation where it serves the needs of its research sponsors. GTRI&rsquo;s research spans a variety of disciplines, including autonomous systems, cybersecurity, electromagnetics, electronic warfare, modeling and simulation, sensors, systems engineering, test and evaluation, and threat systems.</p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1561633139</created>  <gmt_created>2019-06-27 10:58:59</gmt_created>  <changed>1561639851</changed>  <gmt_changed>2019-06-27 12:50:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Institute of Technology has named James J. Hudgens to be the new director of the Georgia Tech Research Institute (GTRI), Georgia Tech’s applied research division. ]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Institute of Technology has named James J. Hudgens to be the new director of the Georgia Tech Research Institute (GTRI), Georgia Tech’s applied research division. ]]></sentence>  <summary><![CDATA[<p>The Georgia Institute of Technology has named James J. Hudgens to be the new director of the Georgia Tech Research Institute (GTRI), Georgia Tech&rsquo;s applied research division. Currently director of the Threat Intelligence Center (TIC) at Sandia National Laboratories in Albuquerque, New Mexico, Hudgens will become a Georgia Tech senior vice president and GTRI&rsquo;s director effective September 2, 2019.</p>]]></summary>  <dateline>2019-06-27T00:00:00-04:00</dateline>  <iso_dateline>2019-06-27T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-06-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>622802</item>          <item>622802</item>      </media>  <hg_media>          <item>          <nid>622802</nid>          <type>image</type>          <title><![CDATA[James J. Hudgens]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[james-hudgens-2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/james-hudgens-2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/james-hudgens-2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/james-hudgens-2.jpg?itok=yrW7hLjL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[James J. Hudgens photo]]></image_alt>                    <created>1561632650</created>          <gmt_created>2019-06-27 10:50:50</gmt_created>          <changed>1561632650</changed>          <gmt_changed>2019-06-27 10:50:50</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="136"><![CDATA[Aerospace]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="136"><![CDATA[Aerospace]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="1366"><![CDATA[defense]]></keyword>          <keyword tid="181593"><![CDATA[James Hudgens]]></keyword>          <keyword tid="181594"><![CDATA[Jim Hudgens]]></keyword>          <keyword tid="525"><![CDATA[military]]></keyword>          <keyword tid="167571"><![CDATA[Sandia]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="593815">  <title><![CDATA[Brain-Mimicking Nanomaterials for A.I. Retina Receive $7 Million Research Grant]]></title>  <uid>31759</uid>  <body><![CDATA[<p>A future android brain like that of Star Trek&rsquo;s Commander Data might contain neuristors, multi-circuit components that emulate the firings of human neurons.</p><p><a href="http://www.nature.com/nmat/journal/v12/n2/full/nmat3510.html" target="_blank">Neuristors</a> already exist today in labs, in small quantities, and to fuel the quest to boost neuristors&rsquo; power and numbers for practical use in brain-like computing, the U.S. Department of Defense has awarded a $7.1 million grant to a research team led by the Georgia Institute of Technology. The researchers will mainly expand work on new metal oxide materials that buzz electronically at the nanoscale to emulate the way human neural networks buzz with electric potential on a cellular level.</p><p>But to walk expectations back from <a href="http://memory-alpha.wikia.com/wiki/Positronic_brain" target="_blank">the distant sci-fi future</a> into the scientific present: The research team has developed&nbsp;neuristor materials to build, for now, an intelligent light sensor, and not some artificial version of the human brain, which would require hundreds of trillions of circuits.</p><p>&ldquo;We&rsquo;re not going to reach circuit complexities of that magnitude, not even a tenth,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/william-alan-doolittle" target="_blank">Alan Doolittle, a professor at Georgia Tech&rsquo;s School of Electrical and Computer Engineering</a>. &ldquo;Also, currently science doesn&rsquo;t really know yet very well how the human brain works, so we can&rsquo;t duplicate it.&rdquo;</p><h4><strong>Intelligent retina</strong></h4><p>But an artificial retina that can learn autonomously appears well within reach of the research team from Georgia Tech and <a href="https://www.binghamton.edu/physics/" target="_blank">Binghamton University</a>. Despite the term &ldquo;retina,&rdquo; the development is not&nbsp;a medical implant, but it could be used in advanced image recognition cameras for national defense and police work.</p><p>At the same time, it significantly advances brain-mimicking, or neuromorphic, computing. The research field that takes its cues from what science already does know about how the brain computes to develop exponentially more powerful computing.</p><p>The retina is&nbsp;comprised of an array of&nbsp;neuristors, which combines the words &ldquo;neuron&rdquo; and &ldquo;transistor&rdquo; to refer to ultracompact circuits. The neuristors sense light, compute an image out of it and store the image. All three of the functions would occur simultaneously and nearly instantaneously.</p><p>&ldquo;The same device senses, computes and stores the image,&rdquo; Doolittle said. &ldquo;The device is the sensor, and it&rsquo;s the processor, and it&rsquo;s the memory all at the same time.&rdquo; A neuristor itself is comprised in part of devices called <a href="https://en.wikipedia.org/wiki/Memristor" target="_blank">memristors</a> inspired by the way human neurons work.</p><p><a href="http://www.rh.gatech.edu/features/cosmos-cranium" target="_blank"><em>[Also READ</em><em><em>:</em> The Brain, Cosmos in the Cranium -- brain research in a nutshell]</em></a></p><h4><strong>Brain vs. PC</strong></h4><p>That cuts out loads of processing and memory lag time that are inherent in traditional computing.</p><p>Take the device you&rsquo;re reading this article on: Its microprocessor has to tap a separate memory component to get data, then do some processing, tap memory again for more data, process some more, etc. &ldquo;That back-and-forth from memory to microprocessor has <a href="http://whatis.techtarget.com/definition/von-Neumann-bottleneck" target="_blank">created a bottleneck</a>,&rdquo; Doolittle said.</p><p>A neuristor array breaks the bottleneck by emulating the extreme flexibility of biological nervous systems: <a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-2-neurons-compute" target="_blank">When a brain </a><a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-2-neurons-compute" target="_blank">computes</a>, it uses a broad set of neural pathways that flash with enormous data. Then, later, to compute the same thing again, it will use quite different neural paths.</p><p>Traditional computer pathways, by contrast, are hardwired. For example, look at a present-day processor and you&rsquo;ll see lines etched into it. Those are pathways that computational signals are limited to.</p><p>The new memristor materials at the heart of the neuristor are not etched, and signals flow through the surface very freely, more like they do through the brain, exponentially increasing the number of possible pathways computation can take. That helps the new intelligent retina compute powerfully and swiftly.</p><h4><strong>Terrorists, missing children</strong></h4><p>The retina&rsquo;s memory could also store thousands of photos, allowing it to immediately match up what it sees with the saved images. The retina could pinpoint known terror suspects in a crowd, find missing children, or identify enemy aircraft virtually instantaneously, without having to trawl databases to correctly identify what is in the images.</p><p>It could even autonomously learn to extrapolate further information, like calculating the third dimension of a face out of data from a two-dimensional image. Even if you take away the optics, the new neuristor arrays still advance <a href="http://www.bbc.com/news/av/technology-34224406/what-is-artificial-intelligence" target="_blank">artificial intelligence</a>. Instead of light, a surface of neuristors could absorb massive data streams at once, compute them, store them, and compare them to patterns of other data, immediately.</p><p>&ldquo;It will work with anything that has a repetitive pattern like radar signatures, for example,&rdquo; Doolittle said. &ldquo;Right now, that&rsquo;s too challenging to compute, because radar information is flying out at such a high data rate that no computer can even think about keeping up.&rdquo;</p><h4><strong>Smart materials</strong></h4><p>The research project&rsquo;s title acronym CEREBRAL may hint at distant dreams of an artificial brain, but what it stands for spells out the present goal in neuromorphic computing: Cross-disciplinary Electronic-ionic Research Enabling Biologically Realistic Autonomous Learning.</p><p>The intelligent retina&rsquo;s neuristors are based on novel metal oxide nanotechnology materials unique to Georgia Tech. They allow computing signals to flow flexibly across pathways <a href="http://www.sciencedirect.com/science/article/pii/S0167273802001820" target="_blank">that are electronic, which is customary in computing, and at the same time make use of ion motion</a>, which is more commonly known from the way batteries and biological systems work.</p><p>The new materials have already been created, and they work, but the researchers don&rsquo;t yet fully understand why.</p><p>Much of the project is dedicated to examining <a href="https://www.youtube.com/watch?v=PBcwv6tqjE0" target="_blank">quantum states</a> in the materials and how those states help create useful electronic-ionic properties. Researchers will view them by bombarding the metal oxides with extremely bright x-ray photons at the recently constructed <a href="https://www.bnl.gov/ps/nsls2/about-NSLS-II.php" target="_blank">National Synchrotron Light Source II</a>.</p><p>Grant sub-awardee Binghamton University is located close by, and Binghamton physicists will run experiments and hone them via theoretical modeling.</p><h4><strong>&lsquo;Sea of lithium&rsquo;</strong></h4><p>The neuristors are created mainly by the way the metal oxide materials are grown in the lab, which has some advantages over building <a href="http://ns.umich.edu/new/releases/24856-next-gen-computing-memristor-chips-that-see-patterns-over-pixels" target="_blank">neuristors in a more wired way</a>.</p><p>This materials-growing approach to creating part of the computational structure is conducive to mass production. Also, though neuristors in general free signals to take multiple pathways, Georgia Tech&rsquo;s neuristors do it much more flexibly thanks to chemical properties.</p><p>&ldquo;We also have a sea of lithium, and it&rsquo;s like an infinite reservoir of computational ionic fluid,&rdquo; Doolittle said. The lithium niobite imitates the way ionic fluid bathes&nbsp;<a href="https://www.khanacademy.org/science/biology/human-biology/neuron-nervous-system/v/sodium-potassium-pump" rel="noopener noreferrer" target="_blank">biological neurons</a>&nbsp;and allows them to flash with electric potential while signaling. In a neuristor array, the lithium niobite helps computational signaling move in myriad directions.</p><p>&ldquo;It&rsquo;s not like the typical semiconductor material, where you etch a line, and only that line has the computational material,&rdquo; Doolittle said.</p><h4><strong>Commander Data&rsquo;s brain?</strong></h4><p>&ldquo;Unlike any other previous neuristors, our neuristors will adapt themselves in their computational-electronic pulsing on the fly, which makes them more like a neurological system,&rdquo; Doolittle said. &ldquo;They mimic biology in that we have ion drift across the material to create the memristors (the memory part of neuristors).&rdquo;</p><p>Brains are far superior to computers at most things, but not all. Brains recognize objects and do motor tasks much better. But computers are much better at arithmetic and data processing.</p><p>Neuristor arrays can meld both types of computing, making them biological and algorithmic at once, a bit like <a href="http://memory-alpha.wikia.com/wiki/Positronic_brain" target="_blank">Commander Data&rsquo;s brain</a>.</p><p><a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-2-neurons-compute" target="_blank">LISTEN: How neurons&nbsp;make the brain compute --&nbsp;audio report</a></p><p><a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-1-molecules" target="_blank">LISTEN: Wondrous facts about the brain -- audio report</a></p><p><em>The research is being funded through the U.S. Department of Defense&rsquo;s Multidisciplinary University Research Initiatives (MURI) Program under grant number FOA: N00014-16-R-FO05. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of those agencies.</em></p>]]></body>  <author>Ben Brumfield</author>  <status>1</status>  <created>1501257463</created>  <gmt_created>2017-07-28 15:57:43</gmt_created>  <changed>1559162206</changed>  <gmt_changed>2019-05-29 20:36:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The dream of computing the way the human brain does comes a step closer thanks to nanomaterials]]></teaser>  <type>news</type>  <sentence><![CDATA[The dream of computing the way the human brain does comes a step closer thanks to nanomaterials]]></sentence>  <summary><![CDATA[<p>The human brain&#39;s computational might is the envy of computer engineers, and emulating it is coming a step closer thanks to new nanomaterials. Georgia Tech research engineers have created next-generation brain-mimmicking memory via &quot;memristors&quot; to underly processing &quot;neuristors.&quot; The engineers are using them to make an artificially intelligent retina&nbsp;that could spot enemy aircraft or find missing children.</p>]]></summary>  <dateline>2017-07-28T00:00:00-04:00</dateline>  <iso_dateline>2017-07-28T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-07-28 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[ben.brumfield@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Research News</strong></p><p><strong>Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contact</strong>: Ben Brumfield (404-660-1408) (ben.brumfield@comm.gatech.edu)</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>593805</item>          <item>593806</item>          <item>593810</item>          <item>593812</item>          <item>593817</item>      </media>  <hg_media>          <item>          <nid>593805</nid>          <type>image</type>          <title><![CDATA[National Synchrotron Light Source II]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[NSLS II.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/NSLS%20II.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/NSLS%20II.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/NSLS%2520II.jpg?itok=dzJVjkoy]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1501249823</created>          <gmt_created>2017-07-28 13:50:23</gmt_created>          <changed>1501262730</changed>          <gmt_changed>2017-07-28 17:25:30</gmt_changed>      </item>          <item>          <nid>593806</nid>          <type>image</type>          <title><![CDATA[Marcus Clean Room with Alan Doolittle and Brooks Tellekamp]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Doolittle.clean_.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Doolittle.clean_.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Doolittle.clean_.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Doolittle.clean_.jpg?itok=wNBWae_l]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1501251265</created>          <gmt_created>2017-07-28 14:14:25</gmt_created>          <changed>1501254357</changed>          <gmt_changed>2017-07-28 15:05:57</gmt_changed>      </item>          <item>          <nid>593810</nid>          <type>image</type>          <title><![CDATA[Synchrotron UK]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Brookhaven.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Brookhaven.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Brookhaven.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Brookhaven.jpg?itok=4ynk4Sbz]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1501254232</created>          <gmt_created>2017-07-28 15:03:52</gmt_created>          <changed>1501254331</changed>          <gmt_changed>2017-07-28 15:05:31</gmt_changed>      </item>          <item>          <nid>593812</nid>          <type>image</type>          <title><![CDATA[Advanced Computing Nanomaterials]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Doolittle.hands_.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Doolittle.hands_.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Doolittle.hands_.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Doolittle.hands_.jpg?itok=j1TE_llP]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1501254805</created>          <gmt_created>2017-07-28 15:13:25</gmt_created>          <changed>1501254805</changed>          <gmt_changed>2017-07-28 15:13:25</gmt_changed>      </item>          <item>          <nid>593817</nid>          <type>image</type>          <title><![CDATA[Alan Doolittle with student Brooks Tellekamp]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Doolittle.outside.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Doolittle.outside.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Doolittle.outside.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Doolittle.outside.jpg?itok=YQ-kVzv3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1501258451</created>          <gmt_created>2017-07-28 16:14:11</gmt_created>          <changed>1501258488</changed>          <gmt_changed>2017-07-28 16:14:48</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="149"><![CDATA[Nanotechnology and Nanoscience]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="149"><![CDATA[Nanotechnology and Nanoscience]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="175011"><![CDATA[neuristor]]></keyword>          <keyword tid="175012"><![CDATA[memristor]]></keyword>          <keyword tid="1159"><![CDATA[Alan Doolittle]]></keyword>          <keyword tid="1785"><![CDATA[nanomaterials]]></keyword>          <keyword tid="175018"><![CDATA[metal oxide]]></keyword>          <keyword tid="91631"><![CDATA[neuromorphic computing]]></keyword>          <keyword tid="175021"><![CDATA[brain-like computing]]></keyword>          <keyword tid="1912"><![CDATA[brain]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="175013"><![CDATA[artificial retina]]></keyword>          <keyword tid="175032"><![CDATA[lithium niobite]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39471"><![CDATA[Materials]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="620260">  <title><![CDATA[Researchers Awarded $6.25 Million to Study Collective Emergent Behavior]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Georgia Tech researchers have been awarded $6.25 million from the Department of Defense (DoD) to use collective emergent behavior to achieve task-oriented objectives.&nbsp;</p><p>DoD&rsquo;s Multidisciplinary University Research Initiatives (MURI) Program funds projects that bring researchers together from diverse backgrounds to work on a complex problem. I<a href="http://ideas.gatech.edu/">nstitute for Data Engineering and Science </a>co-director, Professor <a href="http://people.math.gatech.edu/~randall/">Dana Randall</a>, is project investigator and leads a team of six that includes <a href="https://www.physics.gatech.edu/user/daniel-goldman">Daniel Goldman</a>, Dunn Family Professor in the School of Physics. The Formal Foundations of Algorithmic Matter and Emergent Computation team also includes chemical engineering, mechanical engineering, physics, and computational science researchers from other universities.&nbsp;&nbsp;</p><p>The researchers are trying to predict and design emergent behavior within computation by using basic algorithms on simple machines to perform complex tasks. Emergent behavior is when a microscopic change in a parameter creates a macroscopic change to a system. This collective behavior is easy to find in nature, from a swarm of bees to a colony of ants, but also appears in other scientific disciplines.&nbsp;</p><p>&ldquo;A MURI lets us take a deep dive toward understanding how many computationally limited components at the micro-scale can be programmed to work collectively to produce useful behavior at the macro-scale,&rdquo; said Randall, who is also the ADVANCE Professor of Computing. &ldquo;Our interdisciplinary team combines expertise in many fields, mimicking the research by forming a collaboration that is also greater than the sum of its parts.&quot;</p><p>The MURI hybrid approach to algorithmic matter combines traditional logic-based programming with non-traditional computational methods, such as using physical characteristics of the interacting matter to drive a system toward collective behavior. One of the goals is to program based on this predictable emergent behavior. The approach also predicts basic properties of the collective&rsquo;s emergent behavior, like whether it will behave like a gas, fluid, or solid. In this context, emergent behavior turns into emergent collective computation.</p><p>&ldquo;MURI promises basic algorithms that allow very simple machines to work collectively to perform amazingly complex tasks,&rdquo; Massachusetts Institute of Technology (MIT) chemical engineering Professor <a href="https://srg.mit.edu/">Michael Strano</a> said. &ldquo;Our team will examine systems of autonomous cell-like particles that interact and respond to the movement of their neighbors in a programmable way. Theorists will be able to test ideas of emergent computation from these simple devices and learn how to execute tasks from the behavior of relatively simple, autonomous particles.&rdquo;</p><p>Although the behavior has footing in physics, computer science, and swarm robotics, there is no underlying framework to explain why until this research. The multidisciplinary approach allows theory and experiment to continuously inform each other and determine the computational capabilities of emergent behavior. The team has an ideal range of expertise in machine learning, control theory, and non-equilibrium physics and algorithms. They are also working with experimentalists who build collective systems at granular and microscopic scales.&nbsp;&nbsp;</p><p>&ldquo;An exciting aspect of this collaboration will be our attempts to interface and integrate ideas and tools from robotics, non-equilibrium physics, control theory, and computer science to develop task-capable swarms,&rdquo; Goldman said.</p><p>This MURI project will run for five years and is funded by the Army Research Office. In addition to Randall, Goldman, and Strano, the team also includes Arizona State computational science and engineering Professor Andrea Richa, MIT physics Associate Professor Jeremy England, and Northwestern mechanical engineering Professor Todd Murphey.</p><p>The overarching goal is to find how simplistic the computation can be for this complexity. This could lead to advances in engineered systems achieving specific task-oriented goals.</p><p>&ldquo;The MURI promises nothing short of the transformation of robots,&rdquo; Strano said, &ldquo;from the large, bulky constructions that we think of today, to future clouds or swarms that enable functions that are currently impossible to realize.&rdquo;</p><p><strong>Writer</strong>: Tess Malone</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1554855317</created>  <gmt_created>2019-04-10 00:15:17</gmt_created>  <changed>1554855375</changed>  <gmt_changed>2019-04-10 00:16:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have been awarded $6.25 million to use collective emergent behavior.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have been awarded $6.25 million to use collective emergent behavior.]]></sentence>  <summary><![CDATA[<p>Georgia Tech researchers have been awarded $6.25 million from the Department of Defense (DoD) to use collective emergent behavior to achieve task-oriented objectives.&nbsp;</p>]]></summary>  <dateline>2019-04-09T00:00:00-04:00</dateline>  <iso_dateline>2019-04-09T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-04-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tess.malone@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Tess Malone</p><p>College of Computing</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>620256</item>          <item>620257</item>          <item>620258</item>          <item>620259</item>      </media>  <hg_media>          <item>          <nid>620256</nid>          <type>image</type>          <title><![CDATA[Vibrating robots with magnetic interactions]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[emergent-behavior-003.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/emergent-behavior-003.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/emergent-behavior-003.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/emergent-behavior-003.jpg?itok=IBmAlksz]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Vibrating robots use magnetic interaction]]></image_alt>                    <created>1554854240</created>          <gmt_created>2019-04-09 23:57:20</gmt_created>          <changed>1554854240</changed>          <gmt_changed>2019-04-09 23:57:20</gmt_changed>      </item>          <item>          <nid>620257</nid>          <type>image</type>          <title><![CDATA[Mimicking ferromagnetic materials]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[emergent-behavior-007.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/emergent-behavior-007.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/emergent-behavior-007.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/emergent-behavior-007.jpg?itok=hZGkts7U]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Collection of vibrating robots]]></image_alt>                    <created>1554854384</created>          <gmt_created>2019-04-09 23:59:44</gmt_created>          <changed>1554854384</changed>          <gmt_changed>2019-04-09 23:59:44</gmt_changed>      </item>          <item>          <nid>620258</nid>          <type>image</type>          <title><![CDATA[Researchers for MURI]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[emergent-behavior-015.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/emergent-behavior-015.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/emergent-behavior-015.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/emergent-behavior-015.jpg?itok=Zs0BU_ln]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[MURI researchers]]></image_alt>                    <created>1554854549</created>          <gmt_created>2019-04-10 00:02:29</gmt_created>          <changed>1554854549</changed>          <gmt_changed>2019-04-10 00:02:29</gmt_changed>      </item>          <item>          <nid>620259</nid>          <type>image</type>          <title><![CDATA[Researchers for MURI-2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[emergent-behavior-016.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/emergent-behavior-016.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/emergent-behavior-016.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/emergent-behavior-016.jpg?itok=V9zSsxM1]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[MURI researchers]]></image_alt>                    <created>1554854661</created>          <gmt_created>2019-04-10 00:04:21</gmt_created>          <changed>1554854661</changed>          <gmt_changed>2019-04-10 00:04:21</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="545781"><![CDATA[Institute for Data Engineering and Science]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="181004"><![CDATA[emergent behavior]]></keyword>          <keyword tid="181005"><![CDATA[collective behavior]]></keyword>          <keyword tid="24211"><![CDATA[MURI]]></keyword>          <keyword tid="1356"><![CDATA[robot]]></keyword>          <keyword tid="181009"><![CDATA[vibrating robot]]></keyword>          <keyword tid="3167"><![CDATA[algorithm]]></keyword>          <keyword tid="10467"><![CDATA[Dana Randall]]></keyword>          <keyword tid="47881"><![CDATA[Dan Goldman]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="619757">  <title><![CDATA[Using Smartphones and Laptops to Simulate Deadly Heart Arrhythmias ]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Modeling the complex electrical waves that cause heart arrhythmias could provide the key to understanding and treating a major cause of death in the world. Until now, however, real-time modeling of those deadly waveforms within millions of interacting heart cells required especially powerful computer clusters &ndash; even supercomputers.</p><p>Using graphics processing chips designed for gaming applications and software that runs on ordinary web browsers, researchers have moved this modeling of the deadly spiral wave heart arrhythmias to less costly computers, and even to high-end smartphones. That could put the real-time 3D modeling into the hands of clinicians who may one day use the system to diagnose and treat these abnormal heart rhythms. The new tools could also help researchers study new drugs that must be evaluated for their potential to cause heart arrhythmias.</p><p>Beyond cardiac issues, which can require solving billions of equations, the tools could also be applied to other physical systems, such as fluid flow and crystal growth. The research, which has been supported by the National Science Foundation and National Institutes of Health, is reported March 27 in the journal <em>Science Advances</em>. The new simulation tools rely on Web Graphics Library (WebGL 2.0) and can run on most common operating systems, independent of the operating system.</p><p>&ldquo;Models that might have been accessible to only a handful of researchers in the world will now be available to many more groups,&rdquo; said <a href="http://www.physics.gatech.edu/user/flavio-fenton">Flavio Fenton</a>, a professor in the <a href="http://www.physics.gatech.edu">School of Physics</a> at the Georgia Institute of Technology. &ldquo;This also opens the door to many other areas of research where people have equations that can be run in parallel. Anybody can have access to these solutions, which run simulations as much as thousands of times faster than standard CPUs.&rdquo;</p><p>Fenton and collaborators at Georgia Tech and Rochester Institute of Technology have been studying harmful heart rhythm patterns to understand them &ndash; and potentially to design control strategies that go beyond existing treatments, which use drugs, implantable devices and tissue ablation to halt the arrhythmias. Ultimately, the researchers envision doctors using the simulations on tablet computers.</p><p>&ldquo;Being able to do real-time simulations in three dimensions could open the door to clinical applications where we could actually obtain patient geometries and solve these equations in the cells that are packed into the heart,&rdquo; said Elizabeth Cherry, a professor of mathematics at Rochester Institute of Technology and one of the project researchers. &ldquo;We could see applications in the clinic that could individualize treatments on the basis of their specific heart geometries. We could actually test possible therapies to see what would work for each patient.&rdquo;</p><p>Key to what they have done are graphics processing units (GPUs), which were developed to help computers display graphics and video. Their development and application have now taken off with the growth of the computer gaming industry, which needs fast parallel processing. High-end smartphones have as many as 900 GPU cores, while high-end graphics cards for laptop or desktop computers may have more than 5,000. Each core can process simulation data, providing a massively parallel computing system.</p><p>&ldquo;Over the past several years, GPUs have become really powerful,&rdquo; Fenton said. &ldquo;Each one has multiple processors, so you can run problems in parallel like a supercomputer does. As many as 40 or 50 differential equations must be calculated for each cell, and we need to understand how millions of cells interact. I was surprised that even a cellphone may have enough GPU cores to run these simulations.&rdquo;</p><p>Harnessing GPU power is not all the researchers have done. Software for the GPUs varies by manufacturer and chip type. To allow the simulations to run on any GPU, Research Scientist Abouzar Kaboudian developed a versatile programming library that enabled him and his team of collaborators to develop programs in WebGL that run through web browsers such as Chrome and Firefox. Through a browser, the tools can run the simulations on a variety of computers, tablets and phones &ndash; without the need to install any new programs on them.</p><p>&ldquo;If you have access to the Internet and a modern web browser like Firefox or Chrome, you can just go to a web link and the simulation will start running on the graphics card of your computer,&rdquo; said Kaboudian. &ldquo;Any problem that can be parallelized can run on the library that we have created. It will accelerate simulations on any computer by several hundred times.&rdquo;</p><p>While the original goal was to simulate heart arrhythmias, the tools can be useful with other simulations such as chemical reactions, fluid flow, crystal growth and geophysical forces.</p><p>&ldquo;Oscillating forces can reduce the lifespan of civil engineering structures such as petroleum platforms and underwater pipelines,&rdquo; Kaboudian said. &ldquo;To understand these forces, you have to understand fluid flow around the structures and how to control the oscillations. With this program, you can see the effects of changes to modify your design strategy in real time.&rdquo;</p><p>The researchers have developed ten different models based on their WebGL programming, and are planning to make the tools available to other researchers who want to use them. They are planning future enhancements, such as the ability to run the simulations on more than one GPU card to achieve even higher computational speeds.</p><p>Though high-end graphics cards can range in cost up to thousands of dollars, even those that cost only a few hundred dollars can provide computational power that would be only possible on supercomputers that would normally cost several hundred thousand dollars, Kaboudian said. In this way, they may provide real savings compared to operating large computer clusters or supercomputers. And that could make simulations available to more researchers.</p><p>&ldquo;Being able to run these simulations on GPU cards greatly lowers the cost compared to a traditional supercomputer,&rdquo; Cherry noted. &ldquo;Even the GPUs of high-end cellphones can run these simulations. That will expand access by moving these simulations onto smaller local devices that researchers are familiar with and can afford.&rdquo;</p><p><em>This research was supported by the National Science Foundation&rsquo;s Computer and Network Systems under grants CNS-1446675 and CNS-1446312 and by the National Institute of Health&rsquo;s National Heart Lung and Blood Institute under grant 1R01HL143450-01. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsoring agencies.</em></p><p><strong>CITATION</strong>: Abouzar Kaboudian, Elizabeth M. Cherry, Flavio H. Fenton, &ldquo;Real-time interactive simulations of large-scale systems on personal computers and cell phones: Toward patient-specific heart modeling and other applications,&rdquo; (Science Advances, 2019).&nbsp;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact:</strong> John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1553709778</created>  <gmt_created>2019-03-27 18:02:58</gmt_created>  <changed>1553709990</changed>  <gmt_changed>2019-03-27 18:06:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are using smartphones and laptop computers to model heart arrhythmias.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are using smartphones and laptop computers to model heart arrhythmias.]]></sentence>  <summary><![CDATA[<p>Modeling the complex electrical waves that cause heart arrhythmias could provide the key to understanding and treating a major cause of death in the world. Until now, however, real-time modeling of those deadly waveforms within millions of interacting heart cells required especially powerful computer clusters &ndash; even supercomputers.</p>]]></summary>  <dateline>2019-03-27T00:00:00-04:00</dateline>  <iso_dateline>2019-03-27T00:00:00-04:00</iso_dateline>  <gmt_dateline>2019-03-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>619739</item>          <item>619740</item>          <item>619748</item>          <item>619745</item>          <item>619742</item>      </media>  <hg_media>          <item>          <nid>619739</nid>          <type>image</type>          <title><![CDATA[Cardiac and fluid flow simulations]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[heart-arrhythmia-002.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/heart-arrhythmia-002.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/heart-arrhythmia-002.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/heart-arrhythmia-002.jpg?itok=-sDu9FjU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Examining cardiac and fluid flow simulations]]></image_alt>                    <created>1553708602</created>          <gmt_created>2019-03-27 17:43:22</gmt_created>          <changed>1553708602</changed>          <gmt_changed>2019-03-27 17:43:22</gmt_changed>      </item>          <item>          <nid>619740</nid>          <type>image</type>          <title><![CDATA[Smartphone screens showing cardiac simulations]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[heart-arrhythmia-011.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/heart-arrhythmia-011.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/heart-arrhythmia-011.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/heart-arrhythmia-011.jpg?itok=vxSgv3Re]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cardiac simulations shown on smartphones]]></image_alt>                    <created>1553708752</created>          <gmt_created>2019-03-27 17:45:52</gmt_created>          <changed>1553708752</changed>          <gmt_changed>2019-03-27 17:45:52</gmt_changed>      </item>          <item>          <nid>619748</nid>          <type>image</type>          <title><![CDATA[Researchers discuss simulations]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[heart-arrhythmia-008.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/heart-arrhythmia-008.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/heart-arrhythmia-008.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/heart-arrhythmia-008.jpg?itok=DbHkaRoh]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers discuss simulations]]></image_alt>                    <created>1553709145</created>          <gmt_created>2019-03-27 17:52:25</gmt_created>          <changed>1553709145</changed>          <gmt_changed>2019-03-27 17:52:25</gmt_changed>      </item>          <item>          <nid>619745</nid>          <type>image</type>          <title><![CDATA[Researchers use graphics processing chips]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[heart-arrhythmia-006.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/heart-arrhythmia-006.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/heart-arrhythmia-006.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/heart-arrhythmia-006.jpg?itok=KiwlRrYO]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers using graphics processing chips for simulations]]></image_alt>                    <created>1553709024</created>          <gmt_created>2019-03-27 17:50:24</gmt_created>          <changed>1553709024</changed>          <gmt_changed>2019-03-27 17:50:24</gmt_changed>      </item>          <item>          <nid>619742</nid>          <type>image</type>          <title><![CDATA[Cardiac and fluid flow simulations2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[heart-arrhythmia-005.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/heart-arrhythmia-005.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/heart-arrhythmia-005.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/heart-arrhythmia-005.jpg?itok=b_4nltmM]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Examining cardiac and fluid flow simulations]]></image_alt>                    <created>1553708880</created>          <gmt_created>2019-03-27 17:48:00</gmt_created>          <changed>1553708880</changed>          <gmt_changed>2019-03-27 17:48:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="1278"><![CDATA[College of Sciences]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="180904"><![CDATA[arrhythmia]]></keyword>          <keyword tid="5221"><![CDATA[cardiac]]></keyword>          <keyword tid="2583"><![CDATA[heart]]></keyword>          <keyword tid="168908"><![CDATA[smartphone]]></keyword>          <keyword tid="10420"><![CDATA[graphics processing units]]></keyword>          <keyword tid="205"><![CDATA[GPU]]></keyword>          <keyword tid="167045"><![CDATA[simulation]]></keyword>          <keyword tid="2623"><![CDATA[modeling]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="618865">  <title><![CDATA[Ultra-Low Power Chips Help Make Small Robots More Capable]]></title>  <uid>27303</uid>  <body><![CDATA[<p>An ultra-low power hybrid chip inspired by the brain could help give palm-sized robots the ability to collaborate and learn from their experiences. Combined with new generations of low-power motors and sensors, the new application-specific integrated circuit (ASIC) &ndash; which operates on milliwatts of power &ndash; could help intelligent swarm robots operate for hours instead of minutes.</p><p>To conserve power, the chips use a hybrid digital-analog time-domain processor in which the pulse-width of signals encodes information. The neural network IC accommodates both model-based programming and collaborative reinforcement learning, potentially providing the small robots larger capabilities for reconnaissance, search-and-rescue and other missions.</p><p>Researchers from the Georgia Institute of Technology demonstrated robotic cars driven by the unique ASICs at the 2019 IEEE International Solid-State Circuits Conference (ISSCC). The research was sponsored by the Defense Advanced Research Projects Agency (DARPA) and the Semiconductor Research Corporation (SRC) through the Center for Brain-inspired Computing Enabling Autonomous Intelligence (CBRIC).</p><p>&ldquo;We are trying to bring intelligence to these very small robots so they can learn about their environment and move around autonomously, without infrastructure,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/arijit-raychowdhury">Arijit Raychowdhury</a>, associate professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>. &ldquo;To accomplish that, we want to bring low-power circuit concepts to these very small devices so they can make decisions on their own. There is a huge demand for very small, but capable robots that do not require infrastructure.&rdquo;</p><p>The cars demonstrated by Raychowdhury and graduate students Ningyuan Cao, Muya Chang and Anupam Golder navigate through an arena floored by rubber pads and surrounded by cardboard block walls. As they search for a target, the robots must avoid traffic cones and each other, learning from the environment as they go and continuously communicating with each other.</p><p>The cars use inertial and ultrasound sensors to determine their location and detect objects around them. Information from the sensors goes to the hybrid ASIC, which serves as the &ldquo;brain&rdquo; of the vehicles. Instructions then go to a Raspberry Pi controller, which sends instructions to the electric motors.</p><p>In palm-sized robots, three major systems consume power: the motors and controllers used to drive and steer the wheels, the processor, and the sensing system. In the cars built by Raychowdhury&rsquo;s team, the low-power ASIC means that the motors consume the bulk of the power. &ldquo;We have been able to push the compute power down to a level where the budget is dominated by the needs of the motors,&rdquo; he said.</p><p>The team is working with collaborators on motors that use micro-electromechanical (MEMS) technology able to operate with much less power than conventional motors.&nbsp;</p><p>&ldquo;We would want to build a system in which sensing power, communications and computer power, and actuation are at about the same level, on the order of hundreds of milliwatts,&rdquo; said Raychowdhury, who is the ON Semiconductor Associate Professor in the School of Electrical and Computer Engineering. &ldquo;If we can build these palm-sized robots with efficient motors and controllers, we should be able to provide runtimes of several hours on a couple of AA batteries. We now have a good idea what kind of computing platforms we need to deliver this, but we still need the other components to catch up.&rdquo;</p><p>In time domain computing, information is carried on two different voltages, encoded in the width of the pulses. That gives the circuits the energy-efficiency advantages of analog circuits with the robustness of digital devices.</p><p>&ldquo;The size of the chip is reduced by half, and the power consumption is one-third what a traditional digital chip would need,&rdquo; said Raychowdhury. &ldquo;We used several techniques in both logic and memory designs for reducing power consumption to the milliwatt range while meeting target performance.&rdquo;</p><p>With each pulse-width representing a different value, the system is slower than digital or analog devices, but Raychowdhury says the speed is sufficient for the small robots. (A milliwatt is a thousandth of a watt).</p><p>&ldquo;For these control systems, we don&rsquo;t need circuits that operate at multiple gigahertz because the devices aren&rsquo;t moving that quickly,&rdquo; he said. &ldquo;We are sacrificing a little performance to get extreme power efficiencies. Even if the compute operates at 10 or 100 megahertz, that will be enough for our target applications.&rdquo;</p><p>The 65-nanometer CMOS chips accommodate both kinds of learning appropriate for a robot. The system can be programmed to follow model-based algorithms, and it can learn from its environment using a reinforcement system that encourages better and better performance over time &ndash; much like a child who learns to walk by bumping into things.&nbsp;</p><p>&ldquo;You start the system out with a predetermined set of weights in the neural network so the robot can start from a good place and not crash immediately or give erroneous information,&rdquo; Raychowdhury said. &ldquo;When you deploy it in a new location, the environment will have some structures that it will recognize and some that the system will have to learn. The system will then make decisions on its own, and it will gauge the effectiveness of each decision to optimize its motion.&rdquo;</p><p>Communication between the robots allow them to collaborate to seek a target.&nbsp;</p><p>&ldquo;In a collaborative environment, the robot not only needs to understand what it is doing, but also what others in the same group are doing,&rdquo; he said. &ldquo;They will be working to maximize the total reward of the group as opposed to the reward of the individual.&rdquo;</p><p>With their ISSCC demonstration providing a proof-of-concept, the team is continuing to optimize designs and is working on a system-on-chip to integrate the computation and control circuitry.</p><p>&ldquo;We want to enable more and more functionality in these small robots,&rdquo; Raychowdhury added. &ldquo;We have shown what is possible, and what we have done will now need to be augmented by other innovations.&rdquo;</p><p>This project was supported by the Semiconductor Research Corporation under grant JUMP CBRIC task ID 2777.006.&nbsp;</p><p><strong>CITATION</strong>: Ningyuan Cao, Muya Chang, Arijit Raychowdhury, &ldquo;A 65 nm 1.1-to-9.1 TOPS/W Hybrid-Digital-Mixed-Signal Computing Platform for Accelerating Model-Based and Model Free Swarm Robotics.&rdquo; (2019 IEEE International Solid-State Circuits Conference).</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p><p><strong>Want to stay informed about the latest Georgia Tech research? Subscribe to our free monthly e-newsletter at</strong>&nbsp;<a href="http://www.rh.gatech.edu/subscribe">www.rh.gatech.edu/subscribe</a></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1551839777</created>  <gmt_created>2019-03-06 02:36:17</gmt_created>  <changed>1551839839</changed>  <gmt_changed>2019-03-06 02:37:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[An ultra-low power hybrid chip inspired by the brain could help give palm-sized robots the ability to collaborate and learn from their experiences.]]></teaser>  <type>news</type>  <sentence><![CDATA[An ultra-low power hybrid chip inspired by the brain could help give palm-sized robots the ability to collaborate and learn from their experiences.]]></sentence>  <summary><![CDATA[<p>An ultra-low power hybrid chip inspired by the brain could help give palm-sized robots the ability to collaborate and learn from their experiences. Combined with new generations of low-power motors and sensors, the new application-specific integrated circuit (ASIC) &ndash; which operates on milliwatts of power &ndash; could help intelligent swarm robots operate for hours instead of minutes.</p>]]></summary>  <dateline>2019-03-05T00:00:00-05:00</dateline>  <iso_dateline>2019-03-05T00:00:00-05:00</iso_dateline>  <gmt_dateline>2019-03-05 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>618859</item>          <item>618862</item>          <item>618860</item>          <item>618861</item>          <item>618863</item>      </media>  <hg_media>          <item>          <nid>618859</nid>          <type>image</type>          <title><![CDATA[Ultra-low power chip runs robotic car]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[low-power-023.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/low-power-023.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/low-power-023.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/low-power-023.jpg?itok=CWfIXAhJ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Robotic car with ultra-low power chip]]></image_alt>                    <created>1551838422</created>          <gmt_created>2019-03-06 02:13:42</gmt_created>          <changed>1551838422</changed>          <gmt_changed>2019-03-06 02:13:42</gmt_changed>      </item>          <item>          <nid>618862</nid>          <type>image</type>          <title><![CDATA[Placing robotic car into a test arena 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[low-power-001.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/low-power-001.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/low-power-001.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/low-power-001.jpg?itok=smzhgiyZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Placing robotic car into a test arena]]></image_alt>                    <created>1551838865</created>          <gmt_created>2019-03-06 02:21:05</gmt_created>          <changed>1551838865</changed>          <gmt_changed>2019-03-06 02:21:05</gmt_changed>      </item>          <item>          <nid>618860</nid>          <type>image</type>          <title><![CDATA[hybrid chip operates on milliwatts]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[low-power-018.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/low-power-018.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/low-power-018.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/low-power-018.jpg?itok=S5IDkd5t]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[hybrid ultra-low power chip]]></image_alt>                    <created>1551838616</created>          <gmt_created>2019-03-06 02:16:56</gmt_created>          <changed>1551838616</changed>          <gmt_changed>2019-03-06 02:16:56</gmt_changed>      </item>          <item>          <nid>618861</nid>          <type>image</type>          <title><![CDATA[Placing robotic car into a test arena]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[low-power-004.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/low-power-004.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/low-power-004.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/low-power-004.jpg?itok=H41_o51-]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Placing robotic car into a test arena]]></image_alt>                    <created>1551838750</created>          <gmt_created>2019-03-06 02:19:10</gmt_created>          <changed>1551838750</changed>          <gmt_changed>2019-03-06 02:19:10</gmt_changed>      </item>          <item>          <nid>618863</nid>          <type>image</type>          <title><![CDATA[Research team for ultra-low power chips]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[low-power-020.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/low-power-020.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/low-power-020.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/low-power-020.jpg?itok=u9KjUxrI]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Research team for ultra-low power hybrid chips]]></image_alt>                    <created>1551839033</created>          <gmt_created>2019-03-06 02:23:53</gmt_created>          <changed>1551839033</changed>          <gmt_changed>2019-03-06 02:23:53</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="1356"><![CDATA[robot]]></keyword>          <keyword tid="180716"><![CDATA[robotic car]]></keyword>          <keyword tid="7264"><![CDATA[autonomous]]></keyword>          <keyword tid="180721"><![CDATA[time-domain]]></keyword>          <keyword tid="180718"><![CDATA[ultra-low power]]></keyword>          <keyword tid="3251"><![CDATA[chip]]></keyword>          <keyword tid="180719"><![CDATA[hybrid chip]]></keyword>          <keyword tid="1912"><![CDATA[brain]]></keyword>          <keyword tid="178517"><![CDATA[neural network]]></keyword>          <keyword tid="4897"><![CDATA[collaborative]]></keyword>          <keyword tid="856"><![CDATA[Intelligence]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="617957">  <title><![CDATA[Novel App Uses AI to Guide, Support Cancer Patients]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Artificial Intelligence is helping to guide and support some 50 breast cancer patients in rural Georgia through a novel mobile application that gives them personalized recommendations on everything from side effects to insurance.</p><p>The app, called MyPath, adapts to each stage in a patient&rsquo;s cancer journey. So the information available on the app &ndash; which runs on a tablet computer &ndash; regularly changes based on each patient&rsquo;s progress. Are you scheduled for surgery? MyPath will tell you what you need to know the day before.</p><p>&ldquo;Patients have told us, &lsquo;It just seemed to magically know what I needed,&rsquo;&rdquo; said <a href="https://www.cc.gatech.edu/people/elizabeth-mynatt">Elizabeth Mynatt</a>, principal investigator for the work and Distinguished Professor in the <a href="https://www.ic.gatech.edu/">School of Interactive Computing</a> at Georgia Tech.</p><p>Mynatt, who is also Executive Director of the <a href="http://www.ipat.gatech.edu/">Institute for People and Technology</a>, believes that MyPath is the first healthcare app capable of personalization (through its application of AI) for holistic cancer care. In addition to incorporating a patient&rsquo;s medical data, the app also addresses a variety of other relevant issues such as social and emotional needs.&nbsp;</p><p>She presented the work February 15 at the 2019 meeting of the American Association for the Advancement of Science. The research has been sponsored by the National Cancer Institute.</p><p><strong>National Recognition</strong></p><p>In January MyPath was recognized by iSchools, a consortium of some 100 institutions worldwide (including Georgia Tech) dedicated to advancing the information field. Maia Jacobs, who recently received her Ph.D. from Georgia Tech for her work on MyPath, was named winner of the 2019 iSchools Doctoral Dissertation Award.</p><p>According to iSchools, &ldquo;the Award Committee felt [that Jacobs&rsquo; work] was timely and important, and lauded its impact in how patients manage their health.&rdquo; Jacobs, now a postdoctoral fellow at Harvard, is currently exploring how to expand MyPath to other diseases.</p><p>The work was also honored in 2016 when it was featured in a report to President Barack Obama by the President&rsquo;s Cancer Panel. The report, Improving Cancer-Related Outcomes with Connected Health, aimed to &ldquo;help patients manage their health information and participate in their own care,&rdquo; according to a Georgia Tech story at the time.</p><p><strong>The Beginning</strong></p><p>Six years ago Mynatt&rsquo;s team began working with the Harbin Clinic in Rome, Georgia. &ldquo;They have a tremendous program in holistic cancer care where they recognize that their patients, who are from a large rural area, face a variety of challenges to be able to successfully navigate the cancer journey,&rdquo; Mynatt said.</p><p>But the Harbin doctors and cancer navigators &ndash; people who help patients through the cancer journey &ndash; wanted a better way to stay connected to patients on a regular basis. The navigators, in particular, found that they tended to interact with patients a great deal at diagnosis, but less frequently over time. And that meant that although there are many recommendations for, say, lowering anxiety, they weren&rsquo;t necessarily being communicated.&nbsp;</p><p>Said Mynatt, &ldquo;We wondered how technology could amplify what these great people are doing.&rdquo;</p><p><strong>How it Works</strong></p><p>MyPath begins with a mobile library of resources compiled from the American Cancer Society and other reputable organizations. Then, it is personalized with each patient&rsquo;s diagnosis and treatment plan, including the dates for specific procedures. Patients also complete regular surveys that help inform the system &ndash; and caregivers &ndash; of their changing needs and symptoms.</p><p>The result is a system that provides each patient with resources and suggestions specific to their personal situation. Because MyPath knows, for example, that you have stage 2 breast cancer and will be undergoing a lumpectomy on a specific date, when you click on the category &ldquo;Preparing for Surgery&rdquo; it will suggest relevant articles to prepare you for what&rsquo;s ahead. Have you reported nausea in the system&rsquo;s survey? MyPath will bring your attention to resources that can help combat the side effect. The system also provides quick access to contact information for specific caregivers.</p><p>Other apps &ndash; and the Internet &ndash; aren&rsquo;t personalized. That means slogging through a great deal of often technical information that&rsquo;s not relevant to your situation. In contrast, &ldquo;Every day MyPath puts the right resources at your fingertips to help you through your cancer journey,&rdquo; Mynatt said.</p><p><strong>More than Medical</strong></p><p>Some of MyPath&rsquo;s most popular features have nothing to do directly with cancer. Buttons for &ldquo;Emotional Support&rdquo; and &ldquo;Day to Day Matters&rdquo; are regularly consulted by patients. &ldquo;When we asked them about how they used the tablet for healthcare, many patients would talk to us about playing Angry Birds, which they would download to distract them during chemo sessions,&rdquo; Mynatt said.&nbsp;</p><p>MyPath is the second generation of the app. Patient feedback from its predecessor, My Journey Compass, led to changes including the personalization. Development continues. For example, Mynatt&rsquo;s team is hoping to expand the app for use by cancer survivors, who often face additional challenges like hormone replacement therapy. The team is also working on a version that individual patients could download, which would make the app available to many more users.</p><p><em>This work is sponsored by the National Cancer Institute, part of the National Institutes of Health, under award RO1 CA195653. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health.</em></p><p><strong>Want to stay informed about the latest Georgia Tech research? Subscribe to our free monthly e-newsletter at</strong> <a href="http://www.rh.gatech.edu/subscribe">www.rh.gatech.edu/subscribe</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).<br /><strong>Writer</strong>: Elizabeth Thomson</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1550356057</created>  <gmt_created>2019-02-16 22:27:37</gmt_created>  <changed>1550356569</changed>  <gmt_changed>2019-02-16 22:36:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[MyPath, an AI-based application that runs on tablet computers, is helping breast cancer patients.]]></teaser>  <type>news</type>  <sentence><![CDATA[MyPath, an AI-based application that runs on tablet computers, is helping breast cancer patients.]]></sentence>  <summary><![CDATA[<p>Artificial Intelligence is helping to guide and support some 50 breast cancer patients in rural Georgia through a novel mobile application that gives them personalized recommendations on everything from side effects to insurance.</p>]]></summary>  <dateline>2019-02-16T00:00:00-05:00</dateline>  <iso_dateline>2019-02-16T00:00:00-05:00</iso_dateline>  <gmt_dateline>2019-02-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>617953</item>          <item>617954</item>          <item>617955</item>          <item>617956</item>      </media>  <hg_media>          <item>          <nid>617953</nid>          <type>image</type>          <title><![CDATA[Tablet computer running MyPath app]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mypath_5799.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mypath_5799.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mypath_5799.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mypath_5799.jpg?itok=LeBFQE8A]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[MyPath application on a tablet computer]]></image_alt>                    <created>1550355258</created>          <gmt_created>2019-02-16 22:14:18</gmt_created>          <changed>1550355258</changed>          <gmt_changed>2019-02-16 22:14:18</gmt_changed>      </item>          <item>          <nid>617954</nid>          <type>image</type>          <title><![CDATA[Elizabeth Mynatt with MyPath application]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mypath_5793-square-format.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mypath_5793-square-format.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mypath_5793-square-format.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mypath_5793-square-format.jpg?itok=dWsZ4X27]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Elizabeth Mynatt with MyPath application]]></image_alt>                    <created>1550355392</created>          <gmt_created>2019-02-16 22:16:32</gmt_created>          <changed>1550355392</changed>          <gmt_changed>2019-02-16 22:16:32</gmt_changed>      </item>          <item>          <nid>617955</nid>          <type>image</type>          <title><![CDATA[Elizabeth Mynatt with MyPath application (vertical image)]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mypath_5785.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mypath_5785.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mypath_5785.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mypath_5785.jpg?itok=HqEw5V14]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Elizabeth Mynatt with MyPath application]]></image_alt>                    <created>1550355539</created>          <gmt_created>2019-02-16 22:18:59</gmt_created>          <changed>1550355583</changed>          <gmt_changed>2019-02-16 22:19:43</gmt_changed>      </item>          <item>          <nid>617956</nid>          <type>image</type>          <title><![CDATA[Elizabeth Mynatt with MyPath application (vertical image2)]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mypath_5793.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mypath_5793.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mypath_5793.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mypath_5793.jpg?itok=s7W8I0Cr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Elizabeth Mynatt with MyPath application]]></image_alt>                    <created>1550355671</created>          <gmt_created>2019-02-16 22:21:11</gmt_created>          <changed>1550355671</changed>          <gmt_changed>2019-02-16 22:21:11</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="140"><![CDATA[Cancer Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="140"><![CDATA[Cancer Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="2835"><![CDATA[ai]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="385"><![CDATA[cancer]]></keyword>          <keyword tid="14455"><![CDATA[Breast Cancer]]></keyword>          <keyword tid="176805"><![CDATA[mobile application]]></keyword>          <keyword tid="12888"><![CDATA[IPaT]]></keyword>          <keyword tid="10989"><![CDATA[Beth Mynatt]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="613229">  <title><![CDATA[Antón Named as Technologist Advisor to U.S. National Security Court]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Annie I. Ant&oacute;n, a professor in Georgia Tech&rsquo;s School of Interactive Computing, has been named a technologist advisor to the U.S. Foreign Intelligence Surveillance Court (FISC).</p><p>Starting this month, Ant&oacute;n will assist the court in a part-time role. She is the only academic among the three technologists.&nbsp;</p><p>The FISC may receive assistance from an &ldquo;amicus curiae&rdquo; (friend of the court), who has expertise in privacy and civil liberties, intelligence collection, communications technology or other relevant areas.&nbsp;</p><p>&ldquo;I am honored to be asked to assist with foreign intelligence cases that involve national security, cybersecurity and privacy,&rdquo; Ant&oacute;n said. &ldquo;Technologists play a vital role in helping the courts understand how complex systems operate in practice, in order to assure that systems comply with law.&rdquo;</p><p>Ant&oacute;n, a Georgia Tech graduate, returned to serve as chair of the School of Interactive Computing from 2012 to 2017.</p><p>In 2016, she was one of 12 members of the President&rsquo;s Commission on Enhancing National Cybersecurity.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1540404444</created>  <gmt_created>2018-10-24 18:07:24</gmt_created>  <changed>1540404472</changed>  <gmt_changed>2018-10-24 18:07:52</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Annie I. Antón is the only academic among the three technologists advising the U.S. Foreign Intelligence Surveillance Court. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Annie I. Antón is the only academic among the three technologists advising the U.S. Foreign Intelligence Surveillance Court. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2018-10-24T00:00:00-04:00</dateline>  <iso_dateline>2018-10-24T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-10-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>For media inquiries:&nbsp;Laura Diamond,&nbsp;<a href="mailto:laura.diamond@gatech.edu">laura.diamond@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>522611</item>      </media>  <hg_media>          <item>          <nid>522611</nid>          <type>image</type>          <title><![CDATA[Annie Antón photo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[annie-anton1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/annie-anton1_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/annie-anton1_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/annie-anton1_0.jpg?itok=myRxgTGa]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1460134800</created>          <gmt_created>2016-04-08 17:00:00</gmt_created>          <changed>1480708522</changed>          <gmt_changed>2016-12-02 19:55:22</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="166848"><![CDATA[School of Interactive Computing]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="611150">  <title><![CDATA[Georgia Tech Internet of Things Center Releases Research Report on IoT Data Standards for the Smart Built Environment]]></title>  <uid>28797</uid>  <body><![CDATA[<p>The Georgia Institute of Technology&rsquo;s Center for the Development and Application of Internet of Things Technologies (CDAIT) has released a research report titled &ldquo;Foundational Research in Integrated Building - Internet of Things (IoT) Data Standards,&rdquo; which investigates how to achieve data interoperability in smart building systems applications. It follows the recent related CDAIT white paper on &ldquo;Driving New Modes of IoT-Facilitated Citizen/User Engagement&rdquo; within a smart city context.</p><p>In partnership with the CDAIT IoT Research Working Group composed of industry and technological experts from the CDAIT company members, the research was produced by Georgia Tech College of Design researchers under the supervision of Dr. Pardis Pishdad-Bozorgi of the School of Building Construction and Dr. Dennis Shelden, director of the Digital Building Laboratory (DBL).</p><p>&ldquo;In this report, we propose a strategy and preliminary framework for building level IoT semantic models and open data strategies,&rdquo; said Dr. Pishdad-Bozorgi. &ldquo;Semantic models, which, among other things, attach a fundamental and unambiguous description including spatial context to the data and their interconnection, are critical to fostering data interoperability between building systems,&rdquo; she added.</p><p>The report provides a brief review of the National Institute of Standards and Technology (NIST)&rsquo;s Cyber-Physical Systems (CPS) and IoT-Enabled Smart City Frameworks as well as Building Information Modeling (BIM). &nbsp;It then delves into building data standards and protocols and advances foundational elements for a data acquisition framework for the smart built environment such as smart buildings, smart communities and smart cities.</p><p>&ldquo;Buildings systems often incorporate proprietary networks of sophisticated sensors and actuators in the form of energy systems, security systems, and smart home devices,&rdquo; said Dr. Dennis Shelden. &ldquo;It is a tremendous impediment not only to IoT interconnectivity but also innovation; articulating a sound strategy for connecting emerging IoT data standards with maturing building information standards can fast-track IoT adoption and expansion,&rdquo; he underlined.</p><p>The research leveraged Georgia Tech DBL&rsquo;s many years of expertise and experience in the development of open building information data exchange standards. DBL faculty and staff are leading members of many of the international organizations creating BIM data exchange standards.</p><p>&ldquo;This effort zeroes in on a key IoT vertical market, i.e., smart build environment, and offers a comprehensive perspective on organizations and alliances directly involved in the space,&rdquo; said Alain Louchez, Managing Director of CDAIT. &ldquo;It paves the way for extending building information standards in support of the IoT growth.&rdquo;</p><p>The targeted audience for this report consists of software and telecom engineers; computer scientists; application developers; IT architects; smart building solutions architects; system administrators and engineers; architects; as well as business managers and other parties interested in IoT technical underpinnings.</p><p>The report is available at the <a href="https://cdait.gatech.edu/sites/default/files/georgia_tech_cdait_research_report_on_integrated_building_-_iot_data_standards_september_2018_final.pdf">CDAIT website.</a></p><p><strong>About DBL</strong></p><p>The Digital Building Laboratory (DBL) is a research center in the Georgia Institute of Technology (&ldquo;Georgia Tech&rdquo;)&rsquo;s College of Design that pursues technology driven advances in design, construction, and operations of the built environment. The DBL was founded by Professor Emeritus Chuck Eastman in 2009 and is led by Dennis Shelden, an associate professor in the School of Architecture. The DBL undertakes and sponsors research and development, maintains a consortium of industry members, and conducts industry advancement workshops, symposia and educational programs. For more information, please visit&nbsp;<a href="https://dbl.gatech.edu/">dbl.gatech.edu</a>.</p><p><strong>About CDAIT</strong></p><p>The Center for the Development and Application of Internet of Things Technologies (CDAIT, pronounced &ldquo;sedate&rsquo;) is a Georgia Tech global, nonprofit, partner-funded center located in Atlanta, GA that fosters interdisciplinary research and education while driving general awareness about the Internet of Things (IoT)&rsquo;s huge potential and transformational capabilities. CDAIT aims at efficiently identifying, understanding and solving challenges and problems that may arise along the entire Internet of Things value chain through six Working Groups: IoT Education and Training; IoT Startup Ecosystem; IoT Thought Leadership; IoT Security and Privacy; IoT Standards and Management; and IoT Research.&nbsp;&nbsp;Learn more about CDAIT at <a href="http://www.cdait.gatech.edu/">www.cdait.gatech.edu</a>.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1536572271</created>  <gmt_created>2018-09-10 09:37:51</gmt_created>  <changed>1536581791</changed>  <gmt_changed>2018-09-10 12:16:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech Internet of Things research center issues new report on integrated building data standards.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech Internet of Things research center issues new report on integrated building data standards.]]></sentence>  <summary><![CDATA[<p>New report titled &ldquo;Foundational Research in Integrated Building - Internet of Things (IoT) Data Standards&rdquo; investigates how to achieve data interoperability in smart building systems applications.</p>]]></summary>  <dateline>2018-09-10T00:00:00-04:00</dateline>  <iso_dateline>2018-09-10T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-09-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>611149</item>      </media>  <hg_media>          <item>          <nid>611149</nid>          <type>image</type>          <title><![CDATA[Report on IoT Data Standards for the Smart Built Environment]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[IBDataStandardsCover_September_2018.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/IBDataStandardsCover_September_2018.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/IBDataStandardsCover_September_2018.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/IBDataStandardsCover_September_2018.jpg?itok=LX390c2m]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1536571951</created>          <gmt_created>2018-09-10 09:32:31</gmt_created>          <changed>1536571951</changed>          <gmt_changed>2018-09-10 09:32:31</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://cdait.gatech.edu/sites/default/files/georgia_tech_cdait_research_report_on_integrated_building_-_iot_data_standards_september_2018_final.pdf]]></url>        <title><![CDATA[Foundational Research in Integrated Building - Internet of Things (IoT) Data Standards]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="173063"><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="403"><![CDATA[report]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="610291">  <title><![CDATA[Control System Simulator Helps Operators Learn to Fight Hackers]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A simulator that comes complete with a virtual explosion could help the operators of chemical processing plants &ndash; and other industrial facilities &ndash; learn to detect attacks by hackers bent on causing mayhem. The simulator will also help students and researchers understand better the security issues of industrial control systems.</p><p>Facilities such as electric power networks, manufacturing operations and water purification plants are among the potential targets for malicious actors because they use programmable logic controllers (PLCs) to open and close valves, redirect electricity flows and manage large pieces of machinery. Efforts are underway to secure these facilities, and helping operators become more skilled at detecting potential attacks is a key part of improving security.</p><p>&ldquo;The goal is to give operators, researchers and students experience with attacking systems, detecting attacks and also seeing the consequences of manipulating the physical processes in these systems,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/raheem-a-beyah">Raheem Beyah</a>, the Motorola Foundation Professor in the <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. &ldquo;This system allows operators to learn what kinds of things will happen. Our goal is to make sure the good guys get this experience so they can respond appropriately.&rdquo;</p><p>Details of the simulator were presented August 8 at Black Hat USA 2018, and August 13 at the 2018 USENIX Workshop on Advances in Security Education. The simulator was developed in part by Atlanta security startup company Fortiphyd Logic, and supported by the Georgia Research Alliance.</p><p>The simulated chemical processing plant, known as the Graphical Realism Framework for Industrial Control Simulations (GRFICS), allows users to play the roles of both attackers and defenders &ndash; with separate views provided. The attackers might take control of valves in the plant to build up pressure in a reaction vessel to cause an explosion. The defenders have to watch for signs of attack and make sure security systems remain operational.</p><p>Of great concern is the &ldquo;man-in-the-middle&rdquo; attack in which a bad actor breaks into the facility&rsquo;s control system &ndash; and also takes control of the sensors and instruments that provide feedback to the operators. By gaining control of sensors and valve position indicators, the attacker could send false readings that would reassure the operators &ndash; while the damage proceeded.&nbsp;</p><p>&ldquo;The pressure and reactant levels could be made to seem normal to the operators, while the pressure is building toward a dangerous point,&rdquo; Beyah said. Though the readings may appear normal, however, a knowledgeable operator might still detect clues that the system has been attacked. &ldquo;The more the operators know the process, the harder it will be to fool them,&rdquo; he said.</p><p>The GRFICS system was built using an existing chemical processing plant simulator, as well as a 3D video gaming engine running on Linux virtual machines. At its heart is the software that runs PLCs, which can be changed out to represent different types of controllers appropriate to a range of facilities. The human-machine interface can also be altered as needed to show a realistic operator control panel monitoring reaction parameters and valve controller positions.</p><p>&ldquo;This is a complete virtual network, so you can set up your own entry detection rules and play on the defensive side to see whether or not your defenses are detecting the attacks,&rdquo; said David Formby, a Georgia Tech postdoctoral researcher who has launched Fortiphyd Logic with Beyah to develop industrial control security products. &ldquo;We provide access to simulated physical systems that allow students and operators to repeatedly study different parameters and scenarios.&rdquo;</p><p>GRFICS is currently available as an open source, free download for use by classes or individuals. It runs on a laptop, but because of heavy use of graphics, requires considerable processing power and memory. An online version is planned, and future versions will simulate the electric power grid, water and wastewater treatment facilities, manufacturing facilities and other users of PLCs.</p><p>Formby hopes GRFICS will expand the number of people who have experience with the security of industrial control systems.</p><p>&ldquo;We want to open this space up to more people,&rdquo; he said. &ldquo;It&rsquo;s very difficult now to find people who have the right experience. We haven&rsquo;t seen many attacks on these systems yet, but that&rsquo;s not because they are secure. The barrier for people who want to work in the cyber-physical security space is high right now, and we want to lower that.&rdquo;</p><p>Beyah and Formby have been working for several years to increase awareness of the vulnerabilities inherent in industrial control systems. While the community still has more to do, Beyah is encouraged.</p><p>&ldquo;Several years ago, we talked to a lot of process control engineers as part of the NSF&rsquo;s I-Corps program,&rdquo; he said. &ldquo;It was clear that for many of these folks then, security was not a major concern. But we&rsquo;ve seen changes, and lots of people are now taking system security seriously.&rdquo;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1535056379</created>  <gmt_created>2018-08-23 20:32:59</gmt_created>  <changed>1535056666</changed>  <gmt_changed>2018-08-23 20:37:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A control system simulator for a chemical processing plant could help train operators on security measures.]]></teaser>  <type>news</type>  <sentence><![CDATA[A control system simulator for a chemical processing plant could help train operators on security measures.]]></sentence>  <summary><![CDATA[<p>A simulator that comes complete with a virtual explosion could help the operators of chemical processing plants &ndash; and other industrial facilities &ndash; learn to detect attacks by hackers bent on causing mayhem. The simulator will also help students and researchers understand better the security issues of industrial control systems.</p>]]></summary>  <dateline>2018-08-23T00:00:00-04:00</dateline>  <iso_dateline>2018-08-23T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-08-23 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>610289</item>          <item>610290</item>      </media>  <hg_media>          <item>          <nid>610289</nid>          <type>image</type>          <title><![CDATA[Chemical processing plant simulator]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[industrial-controls2.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/industrial-controls2.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/industrial-controls2.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/industrial-controls2.png?itok=YC19W1rU]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Simulated chemical processing plant]]></image_alt>                    <created>1535055819</created>          <gmt_created>2018-08-23 20:23:39</gmt_created>          <changed>1535055819</changed>          <gmt_changed>2018-08-23 20:23:39</gmt_changed>      </item>          <item>          <nid>610290</nid>          <type>image</type>          <title><![CDATA[Industrial control schematic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[industrial-controls-schematic.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/industrial-controls-schematic.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/industrial-controls-schematic.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/industrial-controls-schematic.png?itok=yGSbjIfS]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Flow charge of data in chemical processing]]></image_alt>                    <created>1535055915</created>          <gmt_created>2018-08-23 20:25:15</gmt_created>          <changed>1535055915</changed>          <gmt_changed>2018-08-23 20:25:15</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="215"><![CDATA[manufacturing]]></keyword>          <keyword tid="168299"><![CDATA[chemical processing]]></keyword>          <keyword tid="178842"><![CDATA[Raheem Bayah]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39461"><![CDATA[Manufacturing, Trade, and Logistics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="609993">  <title><![CDATA[Georgia Tech Internet of Things Center Managing Director to Moderate Panel at Converge 2018]]></title>  <uid>28797</uid>  <body><![CDATA[<p>Georgia Tech&rsquo;s Center for the Development and Application of Internet of Things Technologies &nbsp;(CDAIT) Managing Director Alain Louchez will moderate a panel on the transformative nature of the Internet of Things (IoT) at the IoT Converge 2018 conference at the Georgia Tech Hotel and Conference Center in Atlanta on Sept. 10.</p><p>The goal of the panel, which will include distinguished representatives from CDAIT member companies, is to understand how IoT is being leveraged to create new value for customers, enable&nbsp;new revenue streams&nbsp;and&nbsp;generate&nbsp;overall&nbsp;efficiencies across&nbsp;diverse industry relationships&nbsp;and&nbsp;value chains.</p><p>Louchez will be joined by Robert Bauer, Managing Director, Head of Innovation &amp; Sharing Economy Practice Group at AIG; S&eacute;bastien Lafon, VP, Global Head of Digital &amp; Marketing Services at Boehringer Ingelheim; and Tim Weidenbach, SVP Sales and&nbsp;Customer Operations at Landis+Gyr.</p><p>IoT Converge 2018 will bring together the brightest minds in IoT for an immersive experience that spotlights the IoT convergence connecting multiple industries, driving business growth and igniting the technology ecosystem. Attracting international companies and speakers, IoT Converge 2018 is an exclusive opportunity to interact with 500 tech professionals, hear from globally recognized keynote speakers, engage in eight curated breakout sessions and demo next-gen solutions with 30-plus innovators.</p><p>&ldquo;The annual Technology Association of Georgia (TAG) IoT symposium is always a must-attend event for anyone interested in keeping up with developments in the space,&rdquo; Louchez said. &ldquo;This year is no exception as, by many accounts, IoT technologies are increasingly seen as foundational to companies&rsquo; digital transformation.&rdquo;</p><p>For more information about IoT Converge 2018, visit <a href="http://www.IoTConvergeATL.com">www.IoTConvergeATL.com</a>.</p><p><strong>About CDAIT</strong></p><p>The Center for the Development and Application of Internet of Things Technologies is a Georgia Tech global, nonprofit, partner-funded center located in Atlanta, Georgia that fosters interdisciplinary research and education while driving general awareness about the IoT&rsquo;s huge potential and transformational capabilities. CDAIT aims at efficiently identifying, understanding and solving challenges and problems that may arise along the entire Internet of Things value chain through six working groups: IoT Education and Training; IoT Startup Ecosystem; IoT Thought Leadership; IoT Security and Privacy; IoT Standards and Management; and IoT Research.&nbsp;Learn more about CDAIT at <a href="http://www.cdait.gatech.edu/">www.cdait.gatech.edu</a>.</p><p><strong>About The Technology Association of Georgia (TAG)</strong></p><p>TAG is the leading technology industry association in the state, serving more than 35,000 members through regional chapters in Metro Atlanta, Athens, Augusta, Columbus, Macon/Middle Georgia and Savannah. TAG&rsquo;s mission is to educate, promote, influence and unite Georgia&rsquo;s technology community to foster an innovative and connected marketplace that stimulates and enhances a tech-based economy. Additionally, the TAG Education Collaborative (TAG&rsquo;s charitable arm) focuses on helping science, technology, engineering and mathematics (STEM) education initiatives thrive. For more information visit the TAG website at www.tagonline.org or TAG&rsquo;s community website at <a href="http://www.hubga.com">http://www.hubga.com</a> . To learn about the TAG-Ed Collaborative visit <a href="http://www.tagedonline.org/">http://www.tagedonline.org/</a>.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1534778756</created>  <gmt_created>2018-08-20 15:25:56</gmt_created>  <changed>1534778756</changed>  <gmt_changed>2018-08-20 15:25:56</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[CDAIT Managing Director Alain Louchez will moderate panel of industry leaders.]]></teaser>  <type>news</type>  <sentence><![CDATA[CDAIT Managing Director Alain Louchez will moderate panel of industry leaders.]]></sentence>  <summary><![CDATA[<p>Louchez will moderate a panel at the IoT Converge 2018 conference at the Georgia Tech Hotel and Conference Center in Atlanta on Sept. 10.</p>]]></summary>  <dateline>2018-08-20T00:00:00-04:00</dateline>  <iso_dateline>2018-08-20T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-08-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Panel to focus on Transformative IoT: ‘Real Initiatives, New Possibilities across Multiple Industries’]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>609985</item>      </media>  <hg_media>          <item>          <nid>609985</nid>          <type>image</type>          <title><![CDATA[Converge 2018]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[IoT_Converge_TAG.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/images/IoT_Converge_TAG.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/IoT_Converge_TAG.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/IoT_Converge_TAG.JPG?itok=K_l5D-HZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[conference logo for Converge 2018]]></image_alt>                    <created>1534776212</created>          <gmt_created>2018-08-20 14:43:32</gmt_created>          <changed>1534776212</changed>          <gmt_changed>2018-08-20 14:43:32</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.iotconvergeatl.com/]]></url>        <title><![CDATA[Converge 2018]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>          <group id="69599"><![CDATA[IPaT]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="133"><![CDATA[Special Events and Guest Speakers]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="133"><![CDATA[Special Events and Guest Speakers]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="178782"><![CDATA[Converge 2018]]></keyword>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="79601"><![CDATA[Alain Louchez]]></keyword>          <keyword tid="1270"><![CDATA[conference]]></keyword>          <keyword tid="3984"><![CDATA[panel]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="609512">  <title><![CDATA[Researchers Help Close Security Hole in Popular Encryption Software]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended &ldquo;side channel&rdquo; signals from smartphones.</p><p>The attack, which was reported to software developers before it was publicized, took advantage of programming that was, ironically, designed to provide better security. The attack used intercepted electromagnetic signals from the phones that could have been analyzed using a small portable device costing less than a thousand dollars. Unlike earlier intercept attempts that required analyzing many logins, the &ldquo;One &amp; Done&rdquo; attack was carried out by eavesdropping on just one decryption cycle.</p><p>&ldquo;This is something that could be done at an airport to steal people&rsquo;s information without arousing suspicion and makes the so-called &lsquo;coffee shop attack&rsquo; much more realistic,&rdquo; said <a href="https://www.scs.gatech.edu/people/milos-prvulovic">Milos Prvulovic</a>, associate chair of Georgia Tech&rsquo;s <a href="https://www.scs.gatech.edu/">School of Computer Science</a>. &ldquo;The designers of encryption software now have another issue that they need to take into account because continuous snooping over long periods of time would no longer be required to steal this information.&rdquo;</p><p>The side channel attack is believed to be the first to retrieve the secret exponent of an encryption key in a modern version of OpenSSL without relying on the cache organization and/or timing. OpenSSL is a popular encryption program used for secure interactions on websites and for signature authentication. The attack showed that a single recording of a cryptography key trace was sufficient to break 2048 bits of a private RSA key.&nbsp;</p><p>Results of the research, which was supported in part by the National Science Foundation, the Defense Advanced Research Projects Agency (DARPA), and the Air Force Research Laboratory (AFRL) will be presented at the 27th USENIX Security Symposium August 16th in Baltimore.</p><p>After successfully attacking the phones and an embedded system board &ndash; which all used ARM processors &ndash; the researchers proposed a fix for the vulnerability, which was adopted in versions of the software made available in May.</p><p>Side channel attacks extract sensitive information from signals created by electronic activity within computing devices during normal operation. The signals include electromagnetic emanations created by current flows within the devices computational and power-delivery circuitry, variation in power consumption, and also sound, temperature and chassis potential variation. These emanations are very different from communications signals the devices are designed to produce.</p><p>In their demonstration, Prvulovic and collaborator <a href="https://www.ece.gatech.edu/faculty-staff-directory/alenka-zajic">Alenka Zajic</a> listened in on two different Android phones using probes located near, but not touching the devices. In a real attack, signals could be received from phones or other mobile devices by antennas located beneath tables or hidden in nearby furniture.&nbsp;</p><p>The &ldquo;One &amp; Done&rdquo; attack analyzed signals in a relatively narrow (40 MHz wide) band around the phones&rsquo; processor clock frequencies, which are close to 1 GHz (1,000 MHz). The researchers took advantage of a uniformity in programming that had been designed to overcome earlier vulnerabilities involving variations in how the programs operate.&nbsp;</p><p>&ldquo;Any variation is essentially leaking information about what the program is doing, but the constancy allowed us to pinpoint where we needed to look,&rdquo; said Prvulovic. &ldquo;Once we got the attack to work, we were able to suggest a fix for it fairly quickly. Programmers need to understand that portions of the code that are working on secret bits need to be written in a very particular way to avoid having them leak.&rdquo;</p><p>The researchers are now looking at other software that may have similar vulnerabilities, and expect to develop a program that would allow automated analysis of security vulnerabilities.</p><p>&ldquo;Our goal is to automate this process so it can be used on any code,&rdquo; said Zajic, an associate professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>. &ldquo;We&rsquo;d like to be able to identify portions of code that could be leaky and require a fix. Right now, finding these portions requires considerable expertise and manual examination.&rdquo;</p><p>Side channel attacks are still relatively rare, but Prvulovic says the success of &ldquo;One &amp; Done&rdquo; demonstrates an unexpected vulnerability. The availability of low-cost signal processing devices small enough to use in coffee shops or airports could make the attacks more practical.</p><p>&ldquo;We now have relatively cheap and compact devices &ndash; smaller than a USB drive &ndash; that are capable of analyzing these signals,&rdquo; said Prvulovic. &ldquo;Ten years ago, the analysis of this signal would have taken days. Now it takes just seconds, and can be done anywhere &ndash; not just in a lab setting.&rdquo;</p><p>Producers of mobile devices are becoming more aware of the need to protect electromagnetic signals of phones, tablets and laptops from interception by shielding their side channel emissions. Improving the software running on the devices is also important, but Prvulovic suggests that users of mobile devices must also play a security role.</p><p>&ldquo;This is something that needs to be addressed at all levels,&rdquo; he said. &ldquo;A combination of factors &ndash; better hardware, better software and cautious computer hygiene &ndash; make you safer. You should not be paranoid about using your devices in public locations, but you should be cautious about accessing banking systems or plugging your device into unprotected USB chargers.&rdquo;</p><p>In addition to those already mentioned, the research involved Monjur M. Alam, Haider A. Khan, Moumita Dey, Nishith Sinha and Robert Callen, all of Georgia Tech.</p><p><em>This work has been supported, in part, by the National Science Foundation under grant 1563991 and by the Air Force Research Laboratory and DARPA LADS under contract FA8650-16-C-7620. The views and findings in this paper are those of the authors and do not necessarily reflect the official views of NSF,&nbsp;DARPA or the AFRL.</em></p><p><strong>CITATION</strong>: Monjur M. Alam, et. al., &ldquo;One&amp;Done: A Single-Decryption EM-Based Attack on OpenSSL&rsquo;s Constant-Time Blinded RSA,&rdquo; Proceedings of the 27th USENIX Security Symposium.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1533821514</created>  <gmt_created>2018-08-09 13:31:54</gmt_created>  <changed>1534268671</changed>  <gmt_changed>2018-08-14 17:44:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Cybersecurity researchers have helped close a side channel security vulnerability in popular encryption software.]]></teaser>  <type>news</type>  <sentence><![CDATA[Cybersecurity researchers have helped close a side channel security vulnerability in popular encryption software.]]></sentence>  <summary><![CDATA[<p>Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended &ldquo;side channel&rdquo; signals from smartphones.</p>]]></summary>  <dateline>2018-08-09T00:00:00-04:00</dateline>  <iso_dateline>2018-08-09T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-08-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>609509</item>          <item>609510</item>          <item>609511</item>      </media>  <hg_media>          <item>          <nid>609509</nid>          <type>image</type>          <title><![CDATA[Signal analyzed in encryption study]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[encryption_9631.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/encryption_9631.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/encryption_9631.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/encryption_9631.jpg?itok=WZ0IhpRh]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Wave patterns studied in the encryption analysis]]></image_alt>                    <created>1533820704</created>          <gmt_created>2018-08-09 13:18:24</gmt_created>          <changed>1533820704</changed>          <gmt_changed>2018-08-09 13:18:24</gmt_changed>      </item>          <item>          <nid>609510</nid>          <type>image</type>          <title><![CDATA[Capturing signals from a smartphone]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[encryption-010.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/encryption-010.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/encryption-010.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/encryption-010.jpg?itok=03QTaXjY]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers capture side channel signals]]></image_alt>                    <created>1533820837</created>          <gmt_created>2018-08-09 13:20:37</gmt_created>          <changed>1533820837</changed>          <gmt_changed>2018-08-09 13:20:37</gmt_changed>      </item>          <item>          <nid>609511</nid>          <type>image</type>          <title><![CDATA[Capturing signals from a smartphone2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[encryption-002.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/encryption-002.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/encryption-002.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/encryption-002.jpg?itok=qmg-G_jn]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Capturing signals from a smartphone]]></image_alt>                    <created>1533820948</created>          <gmt_created>2018-08-09 13:22:28</gmt_created>          <changed>1533820948</changed>          <gmt_changed>2018-08-09 13:22:28</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="102261"><![CDATA[encryption]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="178698"><![CDATA[side channel. coffee shop attack]]></keyword>          <keyword tid="11173"><![CDATA[Alenka Zajic]]></keyword>          <keyword tid="114001"><![CDATA[Milos Prvulovic]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="609496">  <title><![CDATA[Georgia Tech Creates Cybersecurity Master’s Degree Online for Less Than $10,000]]></title>  <uid>28797</uid>  <body><![CDATA[<p>The Georgia Institute of Technology has announced a new online cybersecurity master&rsquo;s degree that will be offered for less than $10,000 and delivered in collaboration with <a href="https://www.edx.org/">edX</a>. The <a href="http://omscybersecurity.gatech.edu/">Online Master of Science in Cybersecurity</a> (OMS Cybersecurity) is designed to address a severe global workforce shortage in the field. According to the 2017 Global Information Security Workforce Study, the shortage is expected to reach 1.8 million people by 2022.</p><p>Georgia Tech is the only nationally ranked Top 10 university to offer such a program at a tuition rate intended to increase higher education accessibility and affordability. The degree has existed on campus since 2002 and costs $20,000 for in-state students and $40,000 for those out-of-state. Applications for spring 2019 are open now until October 1, 2018.</p><p>The OMS Cybersecurity program will launch January 7, 2019 with 250 students and will scale over time to meet demand and student needs. The program is designed to serve working professionals who can study part-time and earn the degree within two to three years. It is richly technical and offers the same three interdisciplinary tracks available on campus beginning with information security and followed by policy and energy systems in fall 2019.&nbsp;</p><p>&ldquo;Georgia Tech&rsquo;s OMS Cybersecurity degree pairs world-class computer science, engineering, and public policy instruction with Georgia Tech Research Institute&rsquo;s legacy of applied research in areas related to military, government, and law enforcement,&rdquo; said Rafael L. Bras, provost and executive vice president for Academic Affairs and K. Harrison Brown Family Chair.&nbsp; &quot;As demand continues to grow, Georgia Tech is proud to deliver innovative, affordable, top quality education in high-demand areas, like cybersecurity, to learners around the nation and world.&rdquo;&nbsp;</p><p>OMS Cybersecurity is Georgia Tech&rsquo;s third at-scale online degree program. It will follow the same model as the groundbreaking <a href="http://www.omscs.gatech.edu/">online Master of Science in Computer Science</a> (OMSCS) program, which launched in 2014 on Udacity with support from AT&amp;T and has enrolled approximately 10,000 students overall for the $6,800 degree.&nbsp;The Institute followed on that success in 2017 by launching the <a href="https://pe.gatech.edu/degrees/analytics">Online Master of Science in Analytics</a> on edX with support from AT&amp;T and Accenture, which currently has 706 students in its second semester and costs less than $10,000.&nbsp;</p><p>&ldquo;We are excited to strengthen our partnership with Georgia Tech by now offering two top-ranked online master&rsquo;s degrees in high-demand fields to learners all over the world,&rdquo; said Anant Agarwal, edX CEO and MIT professor. &ldquo;The new OMS Cybersecurity follows on the success of the stacked OMS Analytics on edX, which offers learners the option to start with a MicroMasters program on edX that can count toward their full master&rsquo;s degree. This collaboration with Georgia Tech is the latest milestone in creating stackable, affordable, and accessible online master&rsquo;s degrees in subjects that address today&rsquo;s global skill gaps.&rdquo;</p><p>OMS Cybersecurity is built on the proven success of the on-campus Master of Science in Cybersecurity, which was started as a master&rsquo;s degree in information security in 2002 by Mustaque Ahamad, associate director, Institute for Information Security &amp; Privacy, professor, School of Computer Science, and co-founder and chief scientist at Pindrop, a cybersecurity company. Because of the interdisciplinary nature of the cybersecurity field, the program was broadened to include tracks in energy systems and policy.</p><p>&ldquo;The on-campus program has a long history as a world-class master&rsquo;s degree in information security,&rdquo; said Ahamad. &ldquo;Graduates from this degree have gone on to become top leaders in the field.&rdquo;</p><p>&quot;Cybersecurity is a global problem,&rdquo; said Milton Mueller, professor at Georgia Tech&rsquo;s School of Public Policy, &ldquo;The OMS format not only extends Georgia Tech&#39;s reach to American professionals in cybersecurity, but also makes it possible for working professionals anywhere in the world to avail themselves of Tech&#39;s educational resources and expertise.&quot;&nbsp;</p><p>The U.S. will have 265,000 more cybersecurity jobs than skilled workers by 2022, as projected by the ISC Center for Cyber Safety and Education. Cybersecurity job postings continue to surge, having increased by 71 percent between 2012 and 2017.&nbsp;Job postings specifying a master&rsquo;s degree have grown by 73 percent during the same period, based on data provided in the 2017 Burning Glass/Labor Insights Report. The report also cites the Washington D.C. metro area as ranking first in the country for cybersecurity employment opportunities with 44,244 job postings.&nbsp;</p><p>&quot;As chief information security officers work to protect organizations from malicious cyber threats, they have difficulty finding trained people to staff their team. The cybersecurity workforce pipeline is a critical component to the future of our nation&rsquo;s economic and national security posture. CISOs are excited to hear about Georgia Tech&rsquo;s degree providing enhanced training and teaching multi-faceted skills for employment in the cybersecurity job market,&rdquo; said Patrick Gaul, executive director of the National Technology Security Coalition.&nbsp; &nbsp;</p><p>OMS Cybersecurity is an interdisciplinary collaboration between Georgia Tech&rsquo;s School of Computer Science in the College of Computing, the School of Public Policy in the Ivan Allen College of Liberal Arts, and the School of Electrical and Computer Engineering in the College of Engineering.&nbsp;</p><p>&quot;The OMS Cybersecurity degree offers the same comprehensive, rigorous curriculum as the on-campus program,&quot; said Raheem Beyah, faculty lead for the program, Motorola Foundation Professor and associate chair for Strategic Initiatives and Innovation in the School of Electrical and Computer Engineering, and co-founder of Fortiphyd Logic, Inc., an industrial control cybersecurity company. &ldquo;Courses are taught by leaders in the field of cybersecurity research who are sought after by industry and government entities for their knowledge and expertise.&quot;&nbsp;</p><p>Courses for the program will be designed and produced for online delivery by <a href="https://pe.gatech.edu/">Georgia Tech Professional Education</a> (GTPE), the Institute&rsquo;s lifelong learning arm that has provided professional education for more than 40 years.&nbsp;</p><p>&ldquo;OMS Cybersecurity is designed for working professionals aiming to develop deep expertise in cybersecurity without interrupting their careers,&rdquo; said Nelson C. Baker, dean of GTPE. &ldquo;With this degree, we&rsquo;re able to offer them the opportunity to build careers in a rapidly growing field while delivering cybersecurity experts to industry to address extreme workforce shortages.&rdquo;&nbsp;</p><p>Additional details on the Georgia Tech OMS Cybersecurity program can be found at <a href="http://omscybersecurity.gatech.edu">omscybersecurity.gatech.edu</a>.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1533768299</created>  <gmt_created>2018-08-08 22:44:59</gmt_created>  <changed>1533801449</changed>  <gmt_changed>2018-08-09 07:57:29</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[New online master's in cybersecurity will cost less than $10,000.]]></teaser>  <type>news</type>  <sentence><![CDATA[New online master's in cybersecurity will cost less than $10,000.]]></sentence>  <summary><![CDATA[<p>The OMS Cybersecurity program&nbsp;is designed to address a severe global workforce shortage in the field.</p>]]></summary>  <dateline>2018-08-08T00:00:00-04:00</dateline>  <iso_dateline>2018-08-08T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-08-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Newest at-scale program offered with edX addresses global industry workforce shortage]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>609458</item>          <item>609459</item>      </media>  <hg_media>          <item>          <nid>609458</nid>          <type>image</type>          <title><![CDATA[OMS Cybersecurity]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[General Cybersecurity_thumbnail.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/General%20Cybersecurity_thumbnail.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/General%20Cybersecurity_thumbnail.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/General%2520Cybersecurity_thumbnail.jpg?itok=q2hjsDe1]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[cybersecurity professionals looking at a screen]]></image_alt>                    <created>1533749456</created>          <gmt_created>2018-08-08 17:30:56</gmt_created>          <changed>1533749456</changed>          <gmt_changed>2018-08-08 17:30:56</gmt_changed>      </item>          <item>          <nid>609459</nid>          <type>image</type>          <title><![CDATA[OMS Cybersecurity Course Production]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Filming In Studio.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Filming%20In%20Studio.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Filming%20In%20Studio.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Filming%2520In%2520Studio.jpg?itok=RCfkT4Ep]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[professional education production studio]]></image_alt>                    <created>1533749897</created>          <gmt_created>2018-08-08 17:38:17</gmt_created>          <changed>1533749897</changed>          <gmt_changed>2018-08-08 17:38:17</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.omscybersecurity.gatech.edu]]></url>        <title><![CDATA[OMS Cybersecurity]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1281"><![CDATA[Ivan Allen College of Liberal Arts]]></group>          <group id="1289"><![CDATA[School of Public Policy]]></group>          <group id="1258"><![CDATA[Professional Education]]></group>          <group id="1255"><![CDATA[School of Electrical and Computer Engineering]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="178694"><![CDATA[OMS Cybersecurity]]></keyword>          <keyword tid="66321"><![CDATA[Online Master&#039;s Degree]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="76791"><![CDATA[GTPE]]></keyword>          <keyword tid="38531"><![CDATA[Georgia Tech Professional Education]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="607563">  <title><![CDATA[Georgia Tech Internet of Things Center Offers Perspectives on IoT-Facilitated User Engagement]]></title>  <uid>28797</uid>  <body><![CDATA[<p>With an ever-expanding research portfolio from Georgia Tech faculty, students and member companies, the Georgia Institute of Technology&rsquo;s Center for the Development and Application of Internet of Things Technologies (CDAIT) has released a white paper titled &ldquo;Driving New Modes of IoT-Facilitated Citizen/User Engagement.&rdquo; It summarizes the collective opinion of practitioners and researchers regarding the Internet of Things (IoT), highlighting in particular the inherent intricacies of its value chain, the possible roadmaps to success, and the critical issues that must be urgently resolved.</p><p>Produced by CDAIT&rsquo;s IoT Thought Leadership Working Group, the report explores the Smart City ecosystem as &ldquo;a case in point&rdquo;, reviewing situations in which emerging technologies bring about radical change to traditional business models and substantial benefits to the IoT users.</p><p>&ldquo;This report is timely as the Internet of Things is currently generating a lot of questions from legislators, regulators and businesses in the United States and around the world,&rdquo; said Dr. Karen I. Matthews, Technology and Market Development Manager, Science and Technology at Corning Incorporated, and Chair of the CDAIT IoT Thought Leadership Working Group.</p><p>&ldquo;On the one hand, the risks surrounding cybersecurity and privacy are a legitimate source of concern, and on the other hand, the expectations fueled by widespread enthusiasm regarding the radical transformative nature of the Internet of Things and its associated huge potential are in some cases slow to materialize,&rdquo; she said.</p><p>The white paper introduces an original screening concept called &ldquo;EPIC,&rdquo; which is tailored for cities and any other organized collectivity in charge of the public interest to help them assess the attractiveness and impact of IoT-driven undertakings. Through EPIC, an IoT project is evaluated from four angles: Ethics (impact on individuals, groups and society), Profit (economic and social), Intimacy (ease of access, mutual openness and customized experience), and Connectivity (medium, computing and trustworthiness). &nbsp;</p><p>&ldquo;Readers will find useful discussions and references concerning pressing IoT issues such as security, privacy, platforms and device connection,&rdquo; said Alain Louchez, Co-founder and Managing Director of CDAIT. &ldquo;One of the paper&rsquo;s appeals is that it blends academic and industry perspectives and has a bent for action.&rdquo;</p><p>Among the key expectations regarding the IoT future are the following:</p><ul><li>The IoT will grow in clusters where various use cases and their related devices, applications and connectivity shape their ecosystem.</li><li>There will be a natural tendency for clusters to link first to other like clusters, creating &ldquo;clusters of clusters.&rdquo;</li><li>Standards and regulations will emerge that enhance the performance and interoperability of the clusters of uses.</li><li>The growth and integration of IoT clusters will ultimately lead to an overall IoT common platform.</li></ul><p>The paper&rsquo;s contributors represent a variety of industry sectors and academic disciplines, and are directly involved in building the IoT and its myriad applications. Each shared personal ideas, observations and viewpoints grounded in real-life experience.</p><p>&ldquo;We hope that this effort will provide a better understanding of what the Internet of Things is about, including benefits, critical challenges, and available avenues to address them,&rdquo; Matthews said.</p><p><a href="https://cdait.gatech.edu/sites/default/files/georgia_tech_cdait_thought_leadership_working_group_white_paper_july_9_2018_final.pdf">Download the white paper.</a></p><p><strong>About CDAIT</strong></p><p>The Center for the Development and Application of Internet of Things Technologies (CDAIT, pronounced &ldquo;sedate&rsquo;) is a global, nonprofit, partner-funded center located in Atlanta, GA that fosters interdisciplinary research and education while driving general awareness about the Internet of Things (IoT). CDAIT bridges sponsors with Georgia Institute of Technology (Georgia Tech) faculty and researchers, as well as industry members with similar interests. Central to its value proposition is the belief that only a holistic approach, i.e., mindful of the complexity of the entire IoT value chain and the intricate relationships between the various links, can generate superior results. CDAIT&rsquo;s broad overarching goal is to expand and promote IoT&rsquo;s huge potential and transformational capabilities. Anchored at the Georgia Tech Research Institute (GTRI), a highly regarded applied research and development organization with a global impact and focus on real-world research for government and industry, CDAIT is backed by Georgia Tech&rsquo;s diverse and distinguished community of faculty and researchers. CDAIT aims to efficiently identify, understand and solve challenges and problems that may arise along the entire Internet of Things value chain through six Working Groups: IoT Education and Training; IoT Startup Ecosystem; IoT Thought Leadership; IoT Security and Privacy; IoT Standards and Management; and IoT Research.</p><p>Learn more about CDAIT at <a href="http://www.cdait.gatech.edu/">www.cdait.gatech.edu</a>.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1531131311</created>  <gmt_created>2018-07-09 10:15:11</gmt_created>  <changed>1531135252</changed>  <gmt_changed>2018-07-09 11:20:52</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[CDAIT releases white paper titled “Driving New Modes of IoT-Facilitated Citizen/User Engagement.” ]]></teaser>  <type>news</type>  <sentence><![CDATA[CDAIT releases white paper titled “Driving New Modes of IoT-Facilitated Citizen/User Engagement.” ]]></sentence>  <summary><![CDATA[<p>White paper&nbsp;summarizes the collective opinion of practitioners and researchers regarding the Internet of Things (IoT), highlighting in particular the inherent intricacies of its value chain, the possible roadmaps to success, and the critical issues that must be urgently resolved.</p>]]></summary>  <dateline>2018-07-09T00:00:00-04:00</dateline>  <iso_dateline>2018-07-09T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-07-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>196281</item>      </media>  <hg_media>          <item>          <nid>196281</nid>          <type>image</type>          <title><![CDATA[Centergy Building]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[centergy-bldg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/centergy-bldg_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/centergy-bldg_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/centergy-bldg_1.jpg?itok=KtWMSmU8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449179906</created>          <gmt_created>2015-12-03 21:58:26</gmt_created>          <changed>1531135132</changed>          <gmt_changed>2018-07-09 11:18:52</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://cdait.gatech.edu/]]></url>        <title><![CDATA[CDAIT]]></title>      </link>          <link>        <url><![CDATA[https://cdait.gatech.edu/sites/default/files/georgia_tech_cdait_thought_leadership_working_group_white_paper_july_9_2018_final.pdf]]></url>        <title><![CDATA[White Paper - "Driving New Modes of IoT-Facilitated Citizen/User Engagement"]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>          <group id="69599"><![CDATA[IPaT]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="79601"><![CDATA[Alain Louchez]]></keyword>          <keyword tid="178500"><![CDATA[white paper]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="606801">  <title><![CDATA[FBI: Reset your Router or Face Russian Malware]]></title>  <uid>28797</uid>  <body><![CDATA[<p>It&rsquo;s not every day that the Federal Bureau of Investigation gives you an order.</p><p>On May 25 the <a href="https://www.ic3.gov/media/2018/180525.aspx">FBI asked members of the public</a> to turn off and turn back on their routers because of the spread of malware called &ldquo;VPNFilter&rdquo; created and distributed by the Russian hacker network Sofacy.</p><p>Georgia Tech Senior Research Scientist Charles &ldquo;Chaz&rdquo; Lever explained the damage this malware can do:</p><p>&ldquo;This malware will affect the average user by using one of the capabilities in the malware to passively collect traffic. This can be used to harvest banking credentials or other sensitive password information that is going over the home network. Additionally, your home network could be hijacked to be part of an attack on a remote entity, masking the identity of the original user and potentially putting you in the crosshairs of law enforcement.&rdquo;</p><p>In addition to just a simple reboot, Lever recommended following the manufacturer&rsquo;s instructions on resetting the software in the device, also known as &ldquo;firmware.&rdquo;</p><p>Learn more about cybersecurity research at Georgia Tech by visiting the <a href="http://www.iisp.gatech.edu/">Institute for Information Security and Privacy</a>.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1528324185</created>  <gmt_created>2018-06-06 22:29:45</gmt_created>  <changed>1528900427</changed>  <gmt_changed>2018-06-13 14:33:47</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Reset your router to avoid effects of Russian malware.]]></teaser>  <type>news</type>  <sentence><![CDATA[Reset your router to avoid effects of Russian malware.]]></sentence>  <summary><![CDATA[<p>Georgia Tech Research Scientist explains what can happen to your router if you don&#39;t heed the FBI&#39;s instructions.</p>]]></summary>  <dateline>2018-06-06T00:00:00-04:00</dateline>  <iso_dateline>2018-06-06T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-06-06 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jason.maderer@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>jason.maderer@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>606812</item>      </media>  <hg_media>          <item>          <nid>606812</nid>          <type>image</type>          <title><![CDATA[Charles Lever]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Charles.Lever_.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Charles.Lever_.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Charles.Lever_.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Charles.Lever_.png?itok=YXIQU5rW]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1528380659</created>          <gmt_created>2018-06-07 14:10:59</gmt_created>          <changed>1528380659</changed>          <gmt_changed>2018-06-07 14:10:59</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.iisp.gatech.edu/]]></url>        <title><![CDATA[Institute for Information Security and Privacy]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="178228"><![CDATA[VPNFilter]]></keyword>          <keyword tid="178229"><![CDATA[Charles Lever]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="606177">  <title><![CDATA[Faster Detection, Cleanup of Network Infections are Goals of $12.8 Million Project]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Cybersecurity researchers at the Georgia Institute of Technology have been awarded a $12.8 million contract to develop fundamentally new techniques designed to dramatically accelerate the detection and remediation of infections in local and remote networks. Using novel machine learning techniques that take advantage of large datasets, the researchers will develop ways to detect network infections within 24 hours &ndash; before invaders can do serious damage.</p><p>The technical goal for the new system, dubbed &ldquo;Gnomon,&rdquo; is to detect changes in individual computer systems by analyzing suspicious network traffic that appears weeks or months before any evidence of malicious software &ndash; or malware &ndash; can be identified. As a proof-of-concept, the researchers will work with two major U.S. telecommunication companies and several petabytes of data in basic research aimed at detecting signals of malicious activity on their networks.</p><p>Funded by the Defense Advanced Research Projects Agency (DARPA), the four-year award is part of the agency&rsquo;s Harnessing Autonomy for Countering Cyberadversary Systems (HACCS) program. Beyond rapid detection of infections, the project will also accelerate the cleanup after such infections, creating a clearer pathway in a process known as remediation.</p><p>&ldquo;A compromise becomes a breach only if the original infection remains undetected long enough for the adversaries to do damage,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/manos-antonakakis">Manos Antonakakis</a>, an assistant professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> and the project&rsquo;s co-principal investigator. &ldquo;If you look at the major breaches that have occurred, you see that the adversaries were in the systems for months. We want to identify them in a matter of hours to contain the infection before any real damage can be done.&rdquo;</p><p>The new techniques to be developed will address the realization that network attacks cannot be completely blocked by existing defenses and malware-based detection systems. Dynamic intelligence will be a key feature of the system, with the intent of creating a continuously-updated dossier of every address in IPv4 space.</p><p>&ldquo;Gnomon will search for illicit behavior in computer systems and network signals that indicate the start of an infection,&rdquo; said <a href="http://www.iisp.gatech.edu/michael-farrell">Michael Farrell</a>, chief strategist at the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI), and the principal investigator on the program. &ldquo;We&rsquo;ll use our experience with taking down botnets &ndash; networks of infected computers &ndash; to accelerate the detection and remediation process. It&rsquo;s imperative to evolve our view of the internetwork infrastructure at the same pace that the threat evolves.&rdquo;</p><p>To protect millions of computers on the networks of the two companies, the researchers must find ways to identify troubling behavior on individual IP addresses without endangering the privacy of individuals. Among the signs of trouble are communications with network locations known to house malicious activity. Such communication is necessary for malicious groups to control computers that have been compromised, and to move data stolen from them.</p><p>&ldquo;If you know where the infecting groups are located, you can very easily exclude most of the benign activities occurring on the network,&rdquo; Antonakakis said. &ldquo;We need to be able to identify what has changed in computers throughout the network, understand why the change has happened, and determine whether that change can be attributed to benign or malicious activity. This is a groundbreaking new approach to network security that will require tremendous computing power and infrastructure.&rdquo;</p><p>Ever since the first viruses hit computers in the 1980s, cybersecurity has seen rapid evolution of detection and attack tactics. The success of Gnomon will likely drive adversaries to new attack techniques that may be more complex &ndash; and expensive &ndash; than existing activities. Making cyberattacks more costly to launch may reduce the profit from such activities, making them less attractive.</p><p>&ldquo;If we can clean up our networks faster and more efficiently, that will increase the cost of the attack, making the adversaries work harder,&rdquo; Antonakakis said. &ldquo;If you raise the cost of an attack, the return on investment becomes smaller, while the risk of getting identified becomes higher. We would like to make the business of an attack so unprofitable and so risky for the adversaries that it will not make sense for them to conduct major operations in our networks.&rdquo;</p><p>Success in developing new techniques with the first two telecommunication companies could open the door for scaling up Gnomon to other large networks in industry &ndash; and to U.S. government systems.</p><p>&ldquo;Not only will deployment have an obvious benefit of improved hygiene for a significant portion of the U.S. internet infrastructure, but the public-private partnership will allow us to provide valuable feedback throughout the HACCS program on the sort of prototypes that will be necessary to have true business and mission impact in the real world,&rdquo; Farrell said. &ldquo;The goals are very ambitious, but if we&rsquo;re successful, we&rsquo;ll be able to close the gap between an infection and remediation.&rdquo;</p><p>This program is the latest interdisciplinary research collaboration in cybersecurity at Georgia Tech, orchestrated by the <a href="http://www.iisp.gatech.edu/">Institute for Information Security &amp; Privacy</a> (IISP). In addition to the School of Electrical and Computer Engineering and GTRI, the project will include Professor Brian Kennedy from Georgia Tech&rsquo;s School of Physics.</p><p>Attribution of malicious cyber activity is an established research thrust at Georgia Tech, and this new contract builds on the early success of another Department of Defense (DoD) sponsored program to enhance attribution. The &ldquo;<a href="http://www.rh.gatech.edu/news/584327/17-million-contract-will-help-establish-science-cyber-attribution">Rhamnousia</a>&rdquo; program is now a $25.3 million contract being led by the same research team of Farrell and Antonakakis.</p><p><em>This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under contract number HR001118C0057. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the Defense Advanced Research Projects Agency (DARPA).</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1526340063</created>  <gmt_created>2018-05-14 23:21:03</gmt_created>  <changed>1526340164</changed>  <gmt_changed>2018-05-14 23:22:44</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech has received a $12.8 contract award to accelerate detection of network infections.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech has received a $12.8 contract award to accelerate detection of network infections.]]></sentence>  <summary><![CDATA[<p>Cybersecurity researchers at the Georgia Institute of Technology have been awarded a $12.8 million contract to develop fundamentally new techniques designed to dramatically accelerate the detection and remediation of infections in local and remote networks. Using novel machine learning techniques that take advantage of large datasets, the researchers will develop ways to detect network infections within 24 hours &ndash; before invaders can do serious damage.</p>]]></summary>  <dateline>2018-05-14T00:00:00-04:00</dateline>  <iso_dateline>2018-05-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-05-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>606175</item>          <item>606176</item>      </media>  <hg_media>          <item>          <nid>606175</nid>          <type>image</type>          <title><![CDATA[Countering network threats]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cybersecurity-101.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cybersecurity-101.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cybersecurity-101.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cybersecurity-101.jpg?itok=yHXnxSzl]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cybersecurity graphic with binary code]]></image_alt>                    <created>1526339229</created>          <gmt_created>2018-05-14 23:07:09</gmt_created>          <changed>1526339229</changed>          <gmt_changed>2018-05-14 23:07:09</gmt_changed>      </item>          <item>          <nid>606176</nid>          <type>image</type>          <title><![CDATA[Computer servers]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[servers-058.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/servers-058.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/servers-058.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/servers-058.jpg?itok=Mcdty4BT]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Computer server room]]></image_alt>                    <created>1526339409</created>          <gmt_created>2018-05-14 23:10:09</gmt_created>          <changed>1526339409</changed>          <gmt_changed>2018-05-14 23:10:09</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="545781"><![CDATA[Institute for Data Engineering and Science]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="177979"><![CDATA[cybersecurity. network]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="10660"><![CDATA[infection]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="173795"><![CDATA[Manos Antonakakis]]></keyword>          <keyword tid="177980"><![CDATA[Michael Farrell]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="605486">  <title><![CDATA[Peter Swire Named Andrew Carnegie Fellow]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Georgia Tech professor Peter Swire has been selected to be part of the 2018 class of <a href="https://www.carnegie.org/awards/award/andrew-carnegie-fellows/">Andrew Carnegie Fellows</a>, a prestigious program that supports significant research in the humanities and social sciences.</p><p>Swire&rsquo;s project focuses on the new era of &ldquo;data nationalism,&rdquo; the escalating actions by nations to control the flow of data, especially personal data, from one country to another. This ties into Swire&rsquo;s core research areas of privacy and cybersecurity, including his <a href="http://www.iisp.gatech.edu/cross-border-data-project">ongoing research about the rules for government access to communications and other data</a>. &nbsp;</p><p>&ldquo;This award brings recognition to the crucial issues of how to govern cross-border flows of personal information,&rdquo; said Swire, the <a href="https://www.scheller.gatech.edu/directory/faculty/swire/index.html">Elizabeth and Tommy Holder Chair of Law and Ethics</a> in the Scheller College of Business. &ldquo;I am humbled by the opportunity to try to help solve these global challenges before they turn into severe global problems.&rdquo;</p><p>Swire said the conflicts arising from data nationalism pose large risks to privacy and human rights. It also endangers the effectiveness of legitimate law enforcement and intelligence activities, he said.</p><p>Thirty-one scholars and writers were selected for the fellowship, often called the &ldquo;brainy award,&rdquo; from nearly 300 nominations. Swire is the only recipient from Georgia. &nbsp;</p><p>The winning proposals focus on a variety of political, economic, technological, humanistic and sociological matters.&nbsp;</p><p>&ldquo;The jurors were greatly impressed by the wide range of institutions represented, the remarkable quality and depth of the proposals, and the overall display of intellectual diversity and creativity shown by the nominees,&rdquo; said Susan Hockfield, chair of the Andrew Carnegie Fellows Program jury. &ldquo;Narrowing the field to 31 fellows was both challenging and rewarding for the jurors. We are pleased to know that this investment provides a tremendous opportunity for the fellows to contribute important research and writing to their fields of study, which is a benefit to us all.&rdquo;</p><p>Swire holds courtesy appointments in the College of Computing and in the School of Public Policy in the Ivan Allen College of Liberal Arts. He is associate director for policy in the Institute for Information Security and Privacy.&nbsp;</p><p>In addition to academic appointments, Swire has also held several presidential appointments. Under President Clinton, he was the chief counselor for privacy in the U.S. Office of Management and Budget, the only person to date to have U.S. government-wide responsibility for privacy policy. Under President Obama, he was one of five members of the President&rsquo;s <a href="https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">Review Group on Intelligence and Communications Technologies</a>.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1524601261</created>  <gmt_created>2018-04-24 20:21:01</gmt_created>  <changed>1524660135</changed>  <gmt_changed>2018-04-25 12:42:15</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The fellowship award will support Peter Swire's research in privacy and cybersecurity. ]]></teaser>  <type>news</type>  <sentence><![CDATA[The fellowship award will support Peter Swire's research in privacy and cybersecurity. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2018-04-25T00:00:00-04:00</dateline>  <iso_dateline>2018-04-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-04-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br /><a href="mailto:laura.diamond@gatech.edu">laura.diamond@gatech.edu</a></p><p>404-660-2927</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>605487</item>      </media>  <hg_media>          <item>          <nid>605487</nid>          <type>image</type>          <title><![CDATA[Peter Swire]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[swire_peter_profile.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/swire_peter_profile.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/swire_peter_profile.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/swire_peter_profile.jpg?itok=8zOihvsm]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1524601455</created>          <gmt_created>2018-04-24 20:24:15</gmt_created>          <changed>1524601455</changed>          <gmt_changed>2018-04-24 20:24:15</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>      </news_terms>  <keywords>          <keyword tid="174439"><![CDATA[cybersecurity policy]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="605264">  <title><![CDATA[New Technologies are Helping Connect and Protect the Internet of Things]]></title>  <uid>27303</uid>  <body><![CDATA[<p>From his office five stories above Fifth Street, Gee-Kung Chang looked out over the ever-growing collection of office buildings that comprise Georgia Tech&rsquo;s Technology Square in Midtown Atlanta.</p><p>Every lobby, office, and hallway in the area could someday host numerous &shy;internet-connected sensors, cameras, or control systems as businesses begin to roll out more and more internet of things devices and systems.</p><p>&ldquo;In Tech Square alone, you could have hundreds of thousands of sensors, measuring the temperature of each room, turning on and off lights and cameras, locking and unlocking doors,&rdquo; said&nbsp;Chang, a professor in the&nbsp;School of Electrical and Computer Engineering.</p><p>During the next five years, internet of things products will grow in number to account for more than half of the world&rsquo;s 27.1 billion internet-connected devices, according to a recent forecast from Cisco. In fact, at some point, it may be easier to count the objects not connected to the internet than the ones that are, said Alain Louchez, managing director of Georgia Tech&rsquo;s&nbsp;Center for the Development and Application of Internet of Things Technologies&nbsp;(CDAIT).</p><p>&ldquo;This is what I mean when I say that the internet of things will give rise to a pulsating world &mdash; devices all over constantly sending and receiving data,&rdquo; he said.</p><p>As that internet of things wave approaches, Georgia Tech researchers are exploring the implications of a connected world&nbsp;&mdash; from finding ways to keep hackers at bay to developing the next-generation of wireless and cellular networks capable of supporting so many new devices.</p><p><a href="http://www.rh.gatech.edu/features/connected-new-world">Read the complete article</a> in Georgia Tech&#39;s <em>Research Horizons</em> magazine.</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1524075789</created>  <gmt_created>2018-04-18 18:23:09</gmt_created>  <changed>1524075836</changed>  <gmt_changed>2018-04-18 18:23:56</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are creating a connected new world through the internet of things.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are creating a connected new world through the internet of things.]]></sentence>  <summary><![CDATA[<p>New technologies under development at Georgia Tech are helping protect and connect electronic devices everywhere.</p>]]></summary>  <dateline>2018-04-18T00:00:00-04:00</dateline>  <iso_dateline>2018-04-18T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-04-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[josh.brown@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Josh Brown</p><p>Research News</p><p>(404) 385-0500</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>605262</item>          <item>605263</item>      </media>  <hg_media>          <item>          <nid>605262</nid>          <type>image</type>          <title><![CDATA[Connected New World]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[iot-illustration.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/iot-illustration.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iot-illustration.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/iot-illustration.jpg?itok=kg3PdjxF]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Graphic showing internet of things devices on globe]]></image_alt>                    <created>1524075187</created>          <gmt_created>2018-04-18 18:13:07</gmt_created>          <changed>1524075187</changed>          <gmt_changed>2018-04-18 18:13:07</gmt_changed>      </item>          <item>          <nid>605263</nid>          <type>image</type>          <title><![CDATA[Securing internet of things devices]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[alenka-zajic.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/alenka-zajic.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/alenka-zajic.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/alenka-zajic.jpg?itok=XLlWjAlo]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researcher Alenka Zajic]]></image_alt>                    <created>1524075300</created>          <gmt_created>2018-04-18 18:15:00</gmt_created>          <changed>1524075335</changed>          <gmt_changed>2018-04-18 18:15:35</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="1144"><![CDATA[networking]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="604623">  <title><![CDATA[Human Factors Research Helps Accelerate Mission Planning]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The key to a successful flight mission is planning &ndash; sometimes several hours of it. <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI) specialists in human factors and human computer interfaces are working with NAVAIR PMA-281, Strike Planning and Execution Systems in Patuxent River, Maryland, to streamline the current mission planning process and identify user interface requirements supporting multi-domain mission management in next-generation naval planning capabilities.&nbsp;</p><p>With guidance from the GTRI researchers, the project will improve usability of the mission planning software tools, creating a more consistent and intuitive screen design that&rsquo;s easier to learn and more logical to follow. This effort could benefit all Department of Defense (DoD) agencies for collaborative mission planning.</p><p>&ldquo;We are working with Navy and Marine Corps aviators to identify areas in mission planning where work-flow can be streamlined, reducing the time required to mission plan,&rdquo; said Marcia Crosland, project director for GTRI&rsquo;s Joint Mission Planning System (JMPS) User Interface Design and Usability efforts. &ldquo;Our task has been to define the user interface concepts and decision-making tools to help reduce the time required for mission planning. We&rsquo;ve created detailed designs and specifications to direct current and future development of mission planning systems.&rdquo;</p><p>Mission planning needs to support the ability to collaboratively plan missions involving multiple aircraft but currently does not have that capability. The planning challenge can be quite complex, involving multiple targets, ground-based threats, different aircraft types and a variety of weapons systems. The most complex part of the process is often done by multiple pilots using whiteboards, paper, and spreadsheets to combine relevant information, consider alternatives, and reveal complicated issues.</p><p>Information from the whiteboarding process is then entered into the software system, which produces the mission plans that go on board the aircraft. The GTRI human factors team realized that supporting these whiteboarding activities in the mission planning system could accelerate the mission planning process, and they created new designs to support this functionality.&nbsp;</p><p>&ldquo;We are making recommendations for how the Navy can streamline the process and move it all into the digital world to eliminate the paper and whiteboard processes,&rdquo; said Crosland. &ldquo;That will allow aircrews to plan a mission more efficiently, reducing the time required and potentially highlighting places where automated decision-making tools could be brought into the process.&rdquo;</p><p>She added: &ldquo;We tried to understand the tasks of the user and therefore how the workflow could be streamlined. From that, we designed user interfaces that better implement the tasks, and we developed a style guide to help the DoD software programmers who were implementing it.&rdquo;</p><p>At each iteration of the process, prototype interface designs were evaluated with experts. In some cases, those experts visited the GTRI team in Atlanta to review and discuss the designs.</p><p>&ldquo;We took them through each of the screens to find out what is intuitive to them and what is not,&rdquo; Crosland said. &ldquo;We did this multiple times with different user groups to make sure we had a good set of interface concepts. In this work, it&rsquo;s critical to involve the intended users of the system.&rdquo;</p><p>The GTRI team has applied lessons learned from a variety of domains &ndash; desktop and web design, and commercial and military applications. For instance, shortening the distance between buttons on a screen, reducing the number of clicks necessary for a task, consolidating screens, and providing a consistent workflow direction make a digital system easier and faster to use &ndash; whether it&rsquo;s a website or mission planning system.&nbsp;</p><p>&ldquo;We want to make the system a companion for the aircrews so they consider it a partner in these critical processes,&rdquo; she added. In one case, the researchers were able to consolidate nine separate screens, each with different tabs, into a single screen.</p><p>&ldquo;At the root of all user interface design, whether it&rsquo;s web or something else, is creating a time-efficient task that is intuitive so using it takes less time and less training and creates fewer errors,&rdquo; Crosland said. &ldquo;If you can cut down on errors because users understand the system, it will make the system more efficient.&rdquo;</p><p>GTRI&rsquo;s Human Systems Engineering Branch (HSEB) has been in operation for more than 30 years to help improve the interaction between warfighters and the technologies they use.&nbsp;</p><p>&ldquo;We have significant experience in understanding the domains of mission planning and mission execution, and the components that make technology easier to use,&rdquo; Crosland said. &ldquo;We use established design standards customized for a particular format, whether it&rsquo;s a mobile tablet or standard computer.&rdquo;</p><p>In addition to Crosland, the GTRI team includes more than 20 people. The leadership component includes Tommer Ender, director of GTRI&rsquo;s Electronic Systems Laboratory (ELSYS); Adam McCorkle and J.D. Fassett, both associate directors in ELSYS; Debra Jones, head of ELSYS&rsquo;s HSEB, and C.J. Hutto, associate branch head for HSEB.</p><p>The project&rsquo;s analysis and design team has included Buddy Ray, Stuart Michelson, Andrew Baranak, Vlad Pop, Liz Weldon, Chandler Price, Courtney Crooks, Chris Hale, Mike Fitzpatrick, Robert Kempf; technical advisor John Huggins; HCI graduate students Catherine Johnson, Sarah Brooks and Rachel Chen, undergraduate students Megan Eberle and Spencer Frum; and other GTRI subject matter experts.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1522762835</created>  <gmt_created>2018-04-03 13:40:35</gmt_created>  <changed>1523284048</changed>  <gmt_changed>2018-04-09 14:27:28</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[GTRI researchers are helping streamline the mission planning process for aircrews.]]></teaser>  <type>news</type>  <sentence><![CDATA[GTRI researchers are helping streamline the mission planning process for aircrews.]]></sentence>  <summary><![CDATA[<p>The key to a successful flight mission is planning &ndash; sometimes several hours of it. Georgia Tech Research Institute (GTRI) specialists in human factors and human computer interfaces are working with PMA-281, Strike Planning and Execution Systems in Patuxent River, Maryland, to streamline the current mission planning process and identify user interface requirements supporting multi-domain mission management in next-generation naval planning capabilities.&nbsp;</p>]]></summary>  <dateline>2018-04-03T00:00:00-04:00</dateline>  <iso_dateline>2018-04-03T00:00:00-04:00</iso_dateline>  <gmt_dateline>2018-04-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>604613</item>          <item>604615</item>          <item>604617</item>          <item>604619</item>          <item>604622</item>      </media>  <hg_media>          <item>          <nid>604613</nid>          <type>image</type>          <title><![CDATA[Interface issues for mission planning]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mission-planning4.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mission-planning4.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mission-planning4.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mission-planning4.jpg?itok=hOtfxakm]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Discussing interface issues for mission planning]]></image_alt>                    <created>1522761590</created>          <gmt_created>2018-04-03 13:19:50</gmt_created>          <changed>1522761590</changed>          <gmt_changed>2018-04-03 13:19:50</gmt_changed>      </item>          <item>          <nid>604615</nid>          <type>image</type>          <title><![CDATA[Analyzing the mission planning task]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mission-planning12.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mission-planning12.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mission-planning12.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mission-planning12.jpg?itok=bmwCFgEg]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers analyze the mission planning task]]></image_alt>                    <created>1522761912</created>          <gmt_created>2018-04-03 13:25:12</gmt_created>          <changed>1522761912</changed>          <gmt_changed>2018-04-03 13:25:12</gmt_changed>      </item>          <item>          <nid>604617</nid>          <type>image</type>          <title><![CDATA[Screen capture of interface project]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GTRI Imagine 1.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/GTRI%20Imagine%201.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/GTRI%20Imagine%201.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/GTRI%2520Imagine%25201.png?itok=oNnVxwLb]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Interface concept under devleopment]]></image_alt>                    <created>1522761998</created>          <gmt_created>2018-04-03 13:26:38</gmt_created>          <changed>1522761998</changed>          <gmt_changed>2018-04-03 13:26:38</gmt_changed>      </item>          <item>          <nid>604619</nid>          <type>image</type>          <title><![CDATA[Translating mission requirements to interface design]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mission-planning1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mission-planning1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mission-planning1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mission-planning1.jpg?itok=XW0kFaxl]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Translating mission requirements to interface design]]></image_alt>                    <created>1522762137</created>          <gmt_created>2018-04-03 13:28:57</gmt_created>          <changed>1522762137</changed>          <gmt_changed>2018-04-03 13:28:57</gmt_changed>      </item>          <item>          <nid>604622</nid>          <type>image</type>          <title><![CDATA[Identifying design requirements]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mission-planning7.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mission-planning7.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mission-planning7.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mission-planning7.jpg?itok=jJOkfXEH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Identifying design requirements for mission planning interface]]></image_alt>                    <created>1522762244</created>          <gmt_created>2018-04-03 13:30:44</gmt_created>          <changed>1522762244</changed>          <gmt_changed>2018-04-03 13:30:44</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="136"><![CDATA[Aerospace]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="136"><![CDATA[Aerospace]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="177615"><![CDATA[mission planning]]></keyword>          <keyword tid="2815"><![CDATA[interface]]></keyword>          <keyword tid="177616"><![CDATA[human computer interface]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="7142"><![CDATA[human factors]]></keyword>      </keywords>  <core_research_areas>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="603589">  <title><![CDATA[The Minds of the New Machines - Machine Learning at Georgia Tech]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Machine learning has been around for decades, but the advent of big data and more powerful computers has increased its impact significantly&nbsp;&mdash; &shy;moving machine learning beyond pattern recognition and natural language processing into a broad array of scientific disciplines.</p><p>A subcategory of artificial intelligence, machine learning deals with the construction of algorithms that enable computers to learn from and react to data rather than following explicitly programmed instructions. &ldquo;Machine-learning algorithms build a model based on inputs and then use that model to make other hypotheses, predictions, or decisions,&rdquo; explained&nbsp;<a href="https://www.cc.gatech.edu/people/irfan-essa">Irfan Essa</a>, professor and associate dean in Georgia Tech&rsquo;s&nbsp;<a href="http://www.cc.gatech.edu/">College of Computing</a>&nbsp;who also directs the Institute&rsquo;s&nbsp;<a href="http://ml.gatech.edu/">Center for Machine Learning</a>.</p><p>Established in June 2016, the Center for Machine Learning is comprised of researchers from six colleges and 13 schools at Georgia Tech&nbsp;&mdash; a number that keeps growing. &ldquo;Among our goals is to better coordinate research efforts across campus, serve as a home for machine learning leaders, and train the next generation of leaders,&rdquo; Essa said, referring to Georgia Tech&rsquo;s new&nbsp;<a href="http://www.rh.gatech.edu/features/minds-new-machines#phd-program">Ph.D. program in machine learning</a>.</p><p>Within the center, researchers are striving to advance both basic and applied science. &ldquo;For example, one foundational goal is to really understand deep learning at its core,&rdquo; Essa said. &ldquo;We want to develop new theories and innovative algorithms, rather than just using deep learning as a black box for inputs and outputs.&rdquo; And on the applied research front, the center has seven focal areas: health care, education, logistics, social networks, the financial sector, information security, and robotics.</p><p>See the <a href="http://www.rh.gatech.edu/features/minds-new-machines">complete article</a> from <em>Research Horizons</em> magazine.</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1520622000</created>  <gmt_created>2018-03-09 19:00:00</gmt_created>  <changed>1520622091</changed>  <gmt_changed>2018-03-09 19:01:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are advancing the basic and applied science of machine learning.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are advancing the basic and applied science of machine learning.]]></sentence>  <summary><![CDATA[<p>Machine learning has been around for decades, but the advent of big data and more powerful computers has increased its impact significantly. Georgia Tech researchers are&nbsp;advancing&nbsp;both basic and applied science involved.</p>]]></summary>  <dateline>2018-03-09T00:00:00-05:00</dateline>  <iso_dateline>2018-03-09T00:00:00-05:00</iso_dateline>  <gmt_dateline>2018-03-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[New theories and innovative algorithms support improved prediction and decision-making.]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>603587</item>          <item>603588</item>      </media>  <hg_media>          <item>          <nid>603587</nid>          <type>image</type>          <title><![CDATA[Minds of the New Machines]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[machines.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/machines.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/machines.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/machines.jpg?itok=M4v5MNip]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Graphic for Minds of the New Machines]]></image_alt>                    <created>1520621292</created>          <gmt_created>2018-03-09 18:48:12</gmt_created>          <changed>1520621292</changed>          <gmt_changed>2018-03-09 18:48:12</gmt_changed>      </item>          <item>          <nid>603588</nid>          <type>image</type>          <title><![CDATA[Anticipatory intelligence]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[briscoe-kira.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/briscoe-kira.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/briscoe-kira.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/briscoe-kira.jpg?itok=qEmzNhYL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Erica Briscoe and Zsolt Kira with news screens]]></image_alt>                    <created>1520621446</created>          <gmt_created>2018-03-09 18:50:46</gmt_created>          <changed>1520621446</changed>          <gmt_changed>2018-03-09 18:50:46</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="5660"><![CDATA[algorithms]]></keyword>          <keyword tid="2835"><![CDATA[ai]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="177352"><![CDATA[Iran Essa]]></keyword>          <keyword tid="173555"><![CDATA[Center for Machine Learning]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="603484">  <title><![CDATA[Modernizing Information Systems to Support a New Generation of Army Families]]></title>  <uid>27303</uid>  <body><![CDATA[<p>With their loved ones sometimes deployed far away from home, potentially in harm&rsquo;s way, the families of soldiers face challenging circumstances that can place a strain on everyday life.</p><p>That&rsquo;s what led the Army more than five decades ago to establish the Army Community Service (ACS), a program designed to provide a vast array of social services to soldiers&rsquo; families such as support for new parents, financial counseling and help finding a job.&nbsp;</p><p>Now, the ACS is looking ahead at novel ways to improve how services are delivered and is working with the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI) on a sweeping project to revamp its collection of information systems &ndash; key tools used by staff members providing services to Army families.</p><p>The goal is to make the software smarter, faster, easier to use, and in the long run enable Army leaders to leverage data from the systems to gain new insights that could help shape future services.</p><p>&ldquo;The primary driver for this project was to transform a proprietary and antiquated Army system into a more efficient cloud-friendly environment to enable better service delivery by providing robust access to applications that are vital to accomplishing our customer support missions,&rdquo; said David B. Severson, a program specialist at the Army&rsquo;s Installation Management Command.</p><p>A big part of the effort, which began in 2015, is building systems that can track and process data being gathered by ACS staff members across the Army.&nbsp;</p><p>&ldquo;These systems support the Army&rsquo;s mission to help make soldiers and their families more ready to respond to life&rsquo;s challenges,&rdquo; said Sheila Isbell, a senior research scientist who is leading GTRI&rsquo;s support for the project. &ldquo;The Army&rsquo;s needs outgrew its current information systems, and as a result we&rsquo;re helping to build platforms using cloud-based open architectures that will make the software much more capable and easier to maintain and upgrade over time.&rdquo;</p><p>The project involves the transformation of eight separate information systems and unifying them through a new web interface &ndash; called the Army Family Web Portal (AFWP). ACS staff members will be able to gain access to all of the systems through a single sign-on.</p><p>A key design approach throughout the rebuilding process is presenting data-entry forms that make it easier to capture the right information and reduce the likelihood of missing or incomplete data.</p><p>&ldquo;They needed a system that supported the uploading of that data in a more comprehensive way,&rdquo; said Margarita Gonzalez, a senior research associate at GTRI, who is helping lead the project. &ldquo;Sometimes something as simple as using a drop-down menu rather than an open field makes all the difference in whether a form is completed properly. That then allows for the information in the system to be more complete, more precise and searchable.&rdquo;</p><p>For example, one of the early systems the project team got up and running helped Army leaders keep track of data that required regular review and assessment. That process, which previously had involved collecting information from several different divisions within ACS across the country, typically lasted for weeks. The new system enabled Army leads to cull that data in a matter of days.</p><p>&ldquo;We&rsquo;re designing software that allows them to respond quicker to trends they&rsquo;re noticing among their families,&rdquo; Isbell said. &ldquo;Rather than looking at data retrospectively, this new portal will allow them to look at live data so that in some cases they can take action immediately.&rdquo;</p><p>Another key aspect of the project includes building a secure system that allows all of the different information databases that support each service program to share information or send reports to other databases.</p><p>That feature will come into play for the modernized Volunteer Management Information System (VMIS), which is one of the information systems that is used directly by Army families. VMIS helps track volunteer hours, among other information, for the Army Volunteer Corps., a program that places civilian volunteers into needed roles at an Army installation &ndash; providing a valuable service for the Army while potentially helping volunteers gain work experience that could be useful for career advancement. The transformed cloud-based VMIS will make keeping track of those hours and sharing that information much easier.</p><p>&ldquo;Through the enhanced reporting feature, data will become more readily available to program managers who analyze the program trends,&rdquo; Severson said. &ldquo;This will ultimately assist in making data driven decisions in ACS program improvements.&rdquo;</p><p>For Army social workers, a big part of their job is generating reports that can be used by Army leaders to gain insight into the trends happening at individual installations or throughout the Army. GTRI&rsquo;s task is to create a software suite that makes reporting easier as well.</p><p>&ldquo;If you have a system that better handles the data and generates reports and feedback, as well as one that on the front end that makes it easier for staff members to input, it frees up a lot of time both at the leadership level and at the service-delivery level,&rdquo; Isbell said. &ldquo;It allows leaders to analyze the data faster and really dig into what that information is telling them, and staff members to be better able to provide services to Army families.&rdquo;</p><p>In building the new cloud-based software suite, the GTRI team is also laying the foundation for software that will stand the test of time with an open-source platform as opposed to a closed, proprietary system.</p><p>&ldquo;The idea was to build something that is sustainable for years and years, and make it so that the Army does not have a hard time finding contractors who can make changes and updates,&rdquo; Isbell said. &ldquo;An open source platform is essential to that longevity.&rdquo;</p><p>The open platform can also help the Army keep down costs over time.</p><p>&ldquo;Through the years, the legacy system was limited to only a few support vendors because of its proprietary state,&rdquo; Severson said. &ldquo;The new system focuses on an open source foundation to allow greater flexibility in vendor contract support.&rdquo;</p><p><br /><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: Josh Brown (404-385-0500) (josh.brown@comm.gatech.edu) or John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: Josh Brown</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1520470116</created>  <gmt_created>2018-03-08 00:48:36</gmt_created>  <changed>1520470201</changed>  <gmt_changed>2018-03-08 00:50:01</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[GTRI is helping the Army Community Service upgrade its information systems. ]]></teaser>  <type>news</type>  <sentence><![CDATA[GTRI is helping the Army Community Service upgrade its information systems. ]]></sentence>  <summary><![CDATA[<p>The Georgia Tech Research Institute (GTRI) is helping the Army Community Services on a sweeping project to revamp its collection of information systems &ndash; key tools used by staff members providing services to Army families.</p>]]></summary>  <dateline>2018-03-07T00:00:00-05:00</dateline>  <iso_dateline>2018-03-07T00:00:00-05:00</iso_dateline>  <gmt_dateline>2018-03-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[josh.brown@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Josh Brown</p><p>Research News</p><p>404-853-0500</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>603481</item>          <item>603482</item>          <item>603483</item>      </media>  <hg_media>          <item>          <nid>603481</nid>          <type>image</type>          <title><![CDATA[GTRI researchers support the Army Community Service]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Army_modernization-102-lg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Army_modernization-102-lg.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Army_modernization-102-lg.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Army_modernization-102-lg.jpg?itok=xvf4bR5R]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI researchers Sheila Isbell and Margarita Gonzalez]]></image_alt>                    <created>1520469526</created>          <gmt_created>2018-03-08 00:38:46</gmt_created>          <changed>1520469526</changed>          <gmt_changed>2018-03-08 00:38:46</gmt_changed>      </item>          <item>          <nid>603482</nid>          <type>image</type>          <title><![CDATA[GTRI researchers support the Army Community Service-2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Army_modernization-106-lg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Army_modernization-106-lg.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Army_modernization-106-lg.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Army_modernization-106-lg.jpg?itok=Y2vDS45I]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI researchers Sheila Isbell and Margarita Gonzalez]]></image_alt>                    <created>1520469635</created>          <gmt_created>2018-03-08 00:40:35</gmt_created>          <changed>1520469635</changed>          <gmt_changed>2018-03-08 00:40:35</gmt_changed>      </item>          <item>          <nid>603483</nid>          <type>image</type>          <title><![CDATA[GTRI researchers support the Army Community Service - 3]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Army_modernization-107-lg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Army_modernization-107-lg.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Army_modernization-107-lg.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Army_modernization-107-lg.jpg?itok=2gE5xM_d]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GTRI researchers Sheila Isbell and Margarita Gonzalez]]></image_alt>                    <created>1520469730</created>          <gmt_created>2018-03-08 00:42:10</gmt_created>          <changed>1520469730</changed>          <gmt_changed>2018-03-08 00:42:10</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="3336"><![CDATA[army]]></keyword>          <keyword tid="177328"><![CDATA[Army Community Service]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="177331"><![CDATA[information systems]]></keyword>          <keyword tid="177332"><![CDATA[database. Sheila Isbell]]></keyword>          <keyword tid="177333"><![CDATA[Margarita Gonzalez]]></keyword>      </keywords>  <core_research_areas>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="602606">  <title><![CDATA[Real-Time Captcha Technique Improves Biometric Authentication]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users&rsquo; faces. Known as Real-Time Captcha, the technique uses a unique challenge&nbsp;that&rsquo;s easy for humans &mdash; but difficult for attackers who may be using machine learning and image generation software to spoof legitimate users.</p><p>The Real-Time Captcha requires users to look into their mobile phone&rsquo;s built-in camera while answering a randomly-selected question that appears within a Captcha on the screens of the devices. The response must be given within a limited period of time that&rsquo;s too short for artificial intelligence or machine learning programs to respond. The Captcha would supplement image- and audio-based authentication techniques that can be spoofed by attackers who may be able to find and modify images, video and audio of users &mdash; or steal them from mobile devices.</p><p>The technique was described February 19th at the Network and Distributed Systems Security (NDSS) Symposium 2018 in San Diego, Calif. Supported by the Office of Naval Research (ONR) and the Defense Advanced Research Projects Agency (DARPA), the research was conducted by cyber security specialists at the Georgia Institute of Technology.</p><p>&ldquo;The attackers now know what to expect with authentication that asks them to smile or blink, so they can produce a blinking model or smiling face in real time relatively easily,&rdquo; said Erkam Uzun, a graduate research assistant in Georgia Tech&rsquo;s <a href="https://www.scs.gatech.edu/">School of Computer Science</a> and the paper&rsquo;s first author. &ldquo;We are making the challenge harder by sending users unpredictable requests and limiting the response time to rule out machine interaction.&rdquo;</p><p>As part of efforts to eliminate traditional passwords for logins, mobile devices and online services are moving to biometric techniques that utilize a human face, retina or other biological attribute to verify who is attempting to log in. The iPhone X is designed to unlock with the user&rsquo;s face, for instance, while other systems utilize short video segments of a user nodding, blinking or smiling.</p><p>In the cat-and-mouse game of cybersecurity, those biometrics can be spoofed or stolen, which will force companies to find better approaches, said <a href="https://www.scs.gatech.edu/people/11062/wenke-lees">Wenke Lee</a>, a professor in Georgia Tech&rsquo;s School of Computer Science and co-director of the Georgia Tech <a href="http://www.iisp.gatech.edu/">Institute for Information Security and Privacy.</a></p><p>&ldquo;If the attacker knows that authentication is based on recognizing a face, they can use an algorithm to synthesize a fake image to impersonate the real user,&rdquo; Lee said. &ldquo;But by presenting a randomly-selected challenge embedded in a Captcha image, we can prevent the attacker from knowing what to expect. The security of our system comes from a challenge that is easy for a human, but difficult for a machine.&rdquo;</p><p>In testing done with 30 subjects, the humans were able to respond to the challenges in one second or less. The best machines required between six and ten seconds to decode the question from the Captcha and respond with a faked video and audio. &ldquo;This allows us to determine quickly if the response is from a machine or a human,&rdquo; Uzun said.</p><p>The new approach would require login requests to pass four tests: successful recognition of a challenge question from within a Captcha, response within a narrow time window that only humans can meet, and successful matches to both the legitimate user&rsquo;s pre-recorded image and voice.</p><p>&ldquo;Using face recognition alone for authentication is probably not strong enough,&rdquo; said Lee. &ldquo;We want to combine that with Captcha, a proven technology. If you combine the two, that will make face recognition technology much stronger.&rdquo;</p><p>Captcha technology &ndash; originally an acronym for &ldquo;Completely Automated Public Turing test to tell Computers and Humans Apart&rdquo; &ndash; is widely used to prevent bots from accessing forms on websites. It works by taking advantage of a human&rsquo;s superior ability to recognize patterns in images. The Real-Time Captcha approach would go beyond what&rsquo;s required on websites by prompting a response that will produce live video and audio that would then be matched against a user&rsquo;s stored security profile.</p><p>Captcha challenges might involve recognizing scrambled letters or solving simple math problems. The idea would be to allow humans to respond before machines can even recognize the question.</p><p>&ldquo;Making a still image smile or blink takes a machine just a few seconds, but breaking our Captcha changes takes ten seconds or more,&rdquo; said Uzun.</p><p>In trying to improve authentication, the researchers studied image spoofing software and decided to try a new approach, hoping to open a new front in the battle against attackers. The approach moves the attacker&rsquo;s task from that of generating convincing video to breaking a Captcha.</p><p>&ldquo;We looked at the problem knowing what the attackers would likely do,&rdquo; said Simon Pak Ho Chung, a research scientist in Georgia Tech&rsquo;s School of Computer Science. &ldquo;Improving image quality is one possible response, but we wanted to create a whole new game.&rdquo;</p><p>The real-time Captcha approach shouldn&rsquo;t significantly change bandwidth requirements since the Captcha image sent to mobile devices is small and authentication schemes were already transmitting video and audio, Chung said.</p><p>Among the challenges going forward is overcoming the difficulty of recognizing speech in a noisy environment and securing the connection between the device camera and the authenticating server.</p><p>&ldquo;For any security mechanism that we develop, we need to worry about the security of the mechanism first,&rdquo; Lee said. &ldquo;Once you develop security technology, it becomes a target for the attackers, and that certainly applies to biometric technology.&rdquo;</p><p><em>This research was supported by the ONR under grants N0001409-1-1042, N00014-15-1-2162 and N00014-17-1-2895, and by the DARPA Transparent Computing program under contract DARPA-15-15-TCFP-006. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the ONR or DARPA.</em></p><p><strong>CITATION</strong>: Erkam Uzun, Simon Pak Ho Chung, Irfan Essa and Wenke Lee, &ldquo;rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System,&rdquo; (Network and Distributed Systems Security (NDSS) Symposium 2018).</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1519070290</created>  <gmt_created>2018-02-19 19:58:10</gmt_created>  <changed>1519839439</changed>  <gmt_changed>2018-02-28 17:37:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users’ faces.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users’ faces.]]></sentence>  <summary><![CDATA[<p>A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users&rsquo; faces. Known as Real-Time Captcha, the technique uses a unique challenge&nbsp;that&rsquo;s easy for humans &mdash; but difficult for attackers who may be using machine learning and image generation software to spoof legitimate users.</p>]]></summary>  <dateline>2018-02-19T00:00:00-05:00</dateline>  <iso_dateline>2018-02-19T00:00:00-05:00</iso_dateline>  <gmt_dateline>2018-02-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>602604</item>          <item>602605</item>      </media>  <hg_media>          <item>          <nid>602604</nid>          <type>image</type>          <title><![CDATA[Real-Time Captcha schematic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[rt-captcha-schematic2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/rt-captcha-schematic2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/rt-captcha-schematic2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/rt-captcha-schematic2.jpg?itok=iOrvM8uD]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Schematic for real-time captcha]]></image_alt>                    <created>1519069529</created>          <gmt_created>2018-02-19 19:45:29</gmt_created>          <changed>1519070020</changed>          <gmt_changed>2018-02-19 19:53:40</gmt_changed>      </item>          <item>          <nid>602605</nid>          <type>image</type>          <title><![CDATA[Time window for attacks ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[captcha attack time.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/captcha%20attack%20time.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/captcha%20attack%20time.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/captcha%2520attack%2520time.jpg?itok=pnoruYeK]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Time window for attacks]]></image_alt>                    <created>1519069982</created>          <gmt_created>2018-02-19 19:53:02</gmt_created>          <changed>1519069982</changed>          <gmt_changed>2018-02-19 19:53:02</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="576481"><![CDATA[ML@GT]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="177172"><![CDATA[captcha]]></keyword>          <keyword tid="177173"><![CDATA[real-time captcha]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="10893"><![CDATA[wenke lee]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="602559">  <title><![CDATA[Why Bees Soared and Slime Flopped as Inspirations for Systems Engineering]]></title>  <uid>31759</uid>  <body><![CDATA[<p>Bees? Great. Ants? Hit or miss. Slime mold amoebas? Fail. Though nature offers excellent design inspirations in some information technology systems, in other systems, it can bomb.</p><p>Known for his work on&nbsp;<a href="https://www.goldengooseaward.org/awardees/honey-bee-algorithm" rel="noopener noreferrer" target="_blank">The Honey Bee Algorithm</a>, which tamed web traffic instabilities on servers by mimicking the behavior of bee colonies, systems researcher Craig Tovey has seen plenty of nature-inspired technological feats, but also foibles. He&nbsp;shared them in a talk on February 18&nbsp;at the annual meeting of the American Association for the Advancement of Science in Austin, Texas.</p><p>In 2016, the bee-inspired algorithm garnered Tovey and his collaborators<a href="https://www.goldengooseaward.org/history/" rel="noopener noreferrer" target="_blank">&nbsp;a Golden Goose Award</a>, which commends curiosity-driven research as it blossoms to palpably benefit society. The Honey Bee Algorithm, for example, has saved significant web hosting costs.</p><p>&ldquo;We lucked out with the bees and web hosting,&rdquo; said Tovey, who&nbsp;along with practical takeaways on naturally inspired technology, enjoys passing on his own awe and affection for nature&rsquo;s solutions.</p><h4><strong>When algorithms are eternal</strong></h4><p>&ldquo;When you study swarming bees, you discover truths that are lasting. The algorithms that guide them evolved over millions of years, and will hopefully still be there for millions of years to come,&rdquo; said Tovey, a co-director of&nbsp;<a href="http://www.cbid.gatech.edu/" rel="noopener noreferrer" target="_blank">Georgia Tech&rsquo;s Center for Biologically Inspired Design</a>. &ldquo;Compare that with when you design a new microcircuit. Three years later it&rsquo;s gone, forever lost; replaced by new designs.&rdquo;</p><p>Whether mimicking nature is prudent in a particular engineering job depends a lot on the problem to be solved. Often, it&rsquo;s just better to use something off the shelf or adapt it.</p><p>&ldquo;When the real-life problem is static and well-defined with predictable data, then the nature-inspired methods are usually much weaker, much worse than classical optimization methods,&rdquo; Tovey said.&nbsp;</p><h4><strong>When boring is better</strong></h4><p>The &ldquo;Traveling Salesman Problem&rdquo; is a typical example. A researcher tries to compute the best pathways a proverbial salesperson should travel, and in which order, to visit hundreds, thousands, or tens of thousands of proverbial cities on a map.</p><p>The goal is to travel the shortest possible total distance.</p><p>&ldquo;Nature-inspired approaches will find good solutions for 100 or so cities, but not optimal ones,&rdquo; said Tovey, who is also&nbsp;<a href="https://www.isye.gatech.edu/users/craig-tovey" rel="noopener noreferrer" target="_blank">a professor and Stewart Faculty Fellow in Georgia Tech&rsquo;s Stewart School of Industrial and Systems Engineering</a>. &ldquo;By contrast, the top researchers can solve 20,000 or 50,000 locations optimally with a classical algorithm, and do it really quickly.&rdquo;</p><h4><strong>When ants miss and hit</strong>&nbsp;</h4><p>&ldquo;People have imitated ants to find the optimal pathways through a static system, and when you compare that method with classical optimization methods, then the classical methods are about 10 billion times better.&rdquo;</p><p>But life is fickle, which can make it a great teacher in science and engineering. &ldquo;Every living creature is very good at solving a number of different problems, otherwise it would have gone extinct,&rdquo; Tovey said.</p><p>Toss unpredictability into an engineering problem, and natural algorithms that direct the movements of ants or bees can be better equipped to cope than classical solutions.</p><p>&ldquo;In the Traveling Salesman Problem, the cities don&rsquo;t move around. But when you&rsquo;re chasing a moving target, and your data isn&rsquo;t perfectly complete, then you can have great success by imitating insect swarms. You can get real-time control on data that&rsquo;s quite literally on the fly,&rdquo; Tovey said.&nbsp;</p><h4><strong>When bees know best</strong></h4><p>That counts for a lot in a pinch. When a hurricane looms, people check their weather apps much more frequently as the tempest encroaches. When markets tank, people sell off stocks, and data surges in and out of financial servers.</p><p>&ldquo;If the patterns of user demand on the web never changed, and the requests to a server always stayed the same, all would be well without imitating honeybees,&rdquo; Tovey said. &ldquo;But that notion is ridiculous, as we all know.&rdquo;</p><p>&ldquo;Bees have evolved to deal with flower patches that have changing characteristics. A patch that is great to visit at 10 o&rsquo;clock in the morning may have its flowers closed-up at one o&rsquo;clock in the afternoon, or it may be raining.&rdquo;</p><p>Algorithms steering bee behavior make the insect swarms adjust to supply and demand fluxes similar to those that confront a web server. The honeybees handed Tovey and his fellow researchers valuable insights for their web hosting algorithm.&nbsp;</p><h4><strong>When slime flops but amazes</strong></h4><p>Though classic algorithms beat nature in simple situations, watching natural algorithms in even the simplest organisms can be awe-inspiring. Take slime mold, a non-cellular organism related to amoebas.</p><p>&ldquo;If you put down lumps of food near it, the slime mold will extend to reach the lumps and connect them with each other.&rdquo;</p><p>The mold makes very efficient connections that adapt well to differing constellations of food dabs.</p><p>&ldquo;Some researchers placed food sources in spots corresponding to the locations of cities in Japan that were connected by rail lines, and sure enough, the slime mold eventually settled on a configuration connecting the spots that nearly perfectly matched the rail network that actually connected the cities,&rdquo; Tovey said.</p><p>Again here, classic algorithms do the job better, but still, that slime is just amazing.</p><p>For all his awe of bees, Tovey has had to avoid making their acquaintance in person and leave the bee-handling to his collaborators. &ldquo;I and my whole family are all extremely allergic to bee stings,&rdquo; Tovey said. &ldquo;We keep EpiPens around the house.&rdquo;</p><p>Like this article?&nbsp;<strong><a href="http://www.rh.gatech.edu/subscribe" target="_blank">Get our email newsletter here.</a></strong></p><p><em>The Honey Bee Algorithm team that received the 2016 Golden Goose was comprised of: Tovey, John Hagood Vande Vate, John Bartholdi III, and Sunil Nakrani of Georgia Tech, and Thomas Seeley of Cornell University. The research was funded by the National Science Foundation and the Office of Naval Research.&nbsp;Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.</em></p>]]></body>  <author>Ben Brumfield</author>  <status>1</status>  <created>1519052777</created>  <gmt_created>2018-02-19 15:06:17</gmt_created>  <changed>1519325245</changed>  <gmt_changed>2018-02-22 18:47:25</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Nature can serve as a wonderful model for engineering, but it can also flop.]]></teaser>  <type>news</type>  <sentence><![CDATA[Nature can serve as a wonderful model for engineering, but it can also flop.]]></sentence>  <summary><![CDATA[<p>Honeybee behavior inspired a web hosting algorithm that saved significant costs. But looking to nature for inspiration in engineering can also go wrong. Take slime mold: As a model for connectivity, though it pulls off amazing feats, it falls flat in comparison to classical algorithms.</p>]]></summary>  <dateline>2018-02-19T00:00:00-05:00</dateline>  <iso_dateline>2018-02-19T00:00:00-05:00</iso_dateline>  <gmt_dateline>2018-02-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[ben.brumfield@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Writer &amp;&nbsp;Media Representative</strong>: Ben Brumfield (404-660-1408)</p><p><strong>Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>593355</item>          <item>602552</item>          <item>602553</item>      </media>  <hg_media>          <item>          <nid>593355</nid>          <type>image</type>          <title><![CDATA[Honeybee]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Honeybee at student center.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Honeybee%20at%20student%20center.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Honeybee%20at%20student%20center.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Honeybee%2520at%2520student%2520center.jpg?itok=wyxfdCIc]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Honeybee near the Student Center. Photo by Yumiko Sakurai]]></image_alt>                    <created>1499695795</created>          <gmt_created>2017-07-10 14:09:55</gmt_created>          <changed>1499695795</changed>          <gmt_changed>2017-07-10 14:09:55</gmt_changed>      </item>          <item>          <nid>602552</nid>          <type>image</type>          <title><![CDATA[Honeybees marked]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[beemarksGT.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/beemarksGT.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/beemarksGT.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/beemarksGT.jpg?itok=8GZd4_ff]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1519051162</created>          <gmt_created>2018-02-19 14:39:22</gmt_created>          <changed>1519051423</changed>          <gmt_changed>2018-02-19 14:43:43</gmt_changed>      </item>          <item>          <nid>602553</nid>          <type>image</type>          <title><![CDATA[Honeybees hive and beekeepers]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[beehiveGT.sm_.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/beehiveGT.sm_.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/beehiveGT.sm_.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/beehiveGT.sm_.jpg?itok=jw4ML6z4]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1519051388</created>          <gmt_created>2018-02-19 14:43:08</gmt_created>          <changed>1519051388</changed>          <gmt_changed>2018-02-19 14:43:08</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="177145"><![CDATA[The Honey Bee Algorithm]]></keyword>          <keyword tid="3167"><![CDATA[algorithm]]></keyword>          <keyword tid="167642"><![CDATA[systems engineering]]></keyword>          <keyword tid="177148"><![CDATA[The Golden Goose Award]]></keyword>          <keyword tid="121731"><![CDATA[drawing on nature]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="601449">  <title><![CDATA[Researchers Boost Efficiency and Stability of Optical Rectennas]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The research team that announced the first optical rectenna in 2015 is now reporting a two-fold efficiency improvement in the devices &mdash; and a switch to air-stable diode materials. The improvements could allow the rectennas &ndash; which convert electromagnetic fields at optical frequencies directly to electrical current &ndash; to operate low-power devices such as temperature sensors.</p><p>Ultimately, the researchers believe their device design &ndash; a combination of a carbon nanotube antenna and diode rectifier &ndash; could compete with conventional photovoltaic technologies for producing electricity from sunlight and other sources. The same technology used in the rectennas could also directly convert thermal energy to electricity.</p><p>&ldquo;This work takes a significant leap forward in both fundamental understanding and practical efficiency for the optical rectenna device,&rdquo; said <a href="http://www.me.gatech.edu/faculty/cola">Baratunde Cola</a>, an associate professor in the <a href="http://www.me.gatech.edu/">George W. Woodruff School of Mechanical Engineering</a> at the Georgia Institute of Technology. &ldquo;It opens up this technology to many more researchers who can join forces with us to advance the optical rectenna technology to help power a range of applications, including space flight.&rdquo;</p><p>The research was reported January 26 in the journal <em>Advanced Electronic Materials</em>. The work has been supported by the U.S. Army Research Office under the Young Investigator Program, and by the National Science Foundation.</p><p>Optical rectennas operate by coupling the light&rsquo;s electromagnetic field to an antenna, in this case an array of multiwall carbon nanotubes whose ends have been opened. The electromagnetic field creates an oscillation in the antenna, producing an alternating flow of electrons. When the electron flow reaches a peak at one end of the antenna, the diode closes, trapping the electrons, then re-opens to capture the next oscillation, creating a current flow.</p><p>The switching must occur at terahertz frequencies to match the light. The junction between the antenna and diode must provide minimal resistance to electrons flowing through it while open, yet prevent leakage while closed.</p><p>&ldquo;The name of the game is maximizing the number of electrons that get excited in the carbon nanotube, and then having a switch that is fast enough to capture them at their peak,&rdquo; Cola explained. &ldquo;The faster you switch, the more electrons you can catch on one side of the oscillation.&rdquo;</p><p>To provide a low work function &ndash; ease of electron flow &ndash; the researchers initially used calcium as the metal in their oxide insulator - metal diode junction. But calcium breaks down rapidly in air, meaning the device had to be encapsulated during operation &ndash; and fabricated in a glovebox. That made the optical rectenna both impractical for most applications and difficult to fabricate.</p><p>So Cola, NSF Graduate Research Fellow Erik Anderson and Research Engineer Thomas Bougher replaced the calcium with aluminum and tried a variety of oxide materials on the carbon nanotubes before settling on a bilayer material composed of alumina (Al2O3) and hafnium dioxide (HfO2). The combination coating for the carbon nanotube junction, created through an atomic deposition process, provides the quantum mechanical electron tunneling properties required by engineering the oxide electronic properties instead of the metals, which allows air stable metals with higher work functions than calcium to be used.&nbsp;</p><p>Rectennas fabricated with the new combination have remained functional for as long as a year. Other metal oxides could also be used, Cola said.</p><p>The researchers also engineered the slope of the hill down which the electrons fall in the tunneling process. That also helped increase the efficiency, and allows the use of a variety of oxide materials. The new design also increased the asymmetry of the diodes, which boosted efficiency.</p><p>&ldquo;By working with the oxide electron affinity, we were able to increase the asymmetry by more than ten-fold, making this diode design more attractive,&rdquo; said Cola. &ldquo;That&rsquo;s really where we got the efficiency gain in this new version of the device.&rdquo;</p><p>Optical rectennas could theoretically compete with photovoltaic materials for converting sunlight into electricity. PV materials operate using a different principle, in which photons knock electrons from the atoms of certain materials. The electrons are collected into electrical current.</p><p>In September 2015 in the journal Nature Nanotechnology, Cola and Bougher reported the first optical rectenna &ndash; a device that had been proposed theoretically for more than 40 years, but never demonstrated.&nbsp;</p><p>The early version reported in the journal produced power at microvolt levels. The rectenna now produces power in the millivolt range and conversion efficiency has gone from 10<sup>-5</sup>&nbsp;to 10<sup>-3</sup>&nbsp;&ndash; still very low, but a significant gain.&nbsp;</p><p>&ldquo;Though there still is room for significant improvement, this puts the voltage in the range where you could see optical rectennas operating low-power sensors,&rdquo; Cola said. &ldquo;There are a lot of device geometry steps you could take to do something useful with the optical rectenna today in voltage-driven devices that don&rsquo;t require significant current.&rdquo;</p><p>Cola believes the rectennas could be useful for powering internet of things devices, especially if they can be used to produce electricity from scavenged thermal energy. For converting heat to electricity, the principle is the same as for light &ndash; capturing oscillations in a field with the broadband carbon nanotube antenna.</p><p>&ldquo;People have been excited about thermoelectric generators, but there are many limitations on getting a system that works effectively,&rdquo; he said. &ldquo;We believe that the rectenna technology will be the best approach for harvesting heat economically.&rdquo;</p><p>In future work, the research team hopes to optimize the antenna operation, and improve their theoretical understanding of how the rectenna works, allowing further optimization. One day, Cola hopes the devices will help accelerate space travel, producing power for electric thrusters that will boost spacecraft.</p><p>&ldquo;Our end game is to see carbon nanotube optical rectennas working on Mars and in the spacecraft that takes us to Mars,&rdquo; he said.</p><p><em>This work was supported by the Army Research Office under the Young Investigator Program agreement W911NF-13-1-0491 and the National Science Foundation Graduate Research Fellowship program under grant DGE-1650044. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the sponsoring organizations.</em></p><p><strong>CITATION</strong>: Erik C. Anderson, Thomas L. Bougher and Bartatunde A. Cola, &ldquo;High Performance Multiwall Carbon Nanotube&ndash;Insulator&ndash;Metal Tunnel Diode Arrays for Optical Rectification, (Advanced Electronic Materials, 2018). <a href="http://dx.doi.org/10.1002/aelm.201700446">http://dx.doi.org/10.1002/aelm.201700446</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Josh Brown (404-385-0500) (josh.brown@comm.gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1516999256</created>  <gmt_created>2018-01-26 20:40:56</gmt_created>  <changed>1516999408</changed>  <gmt_changed>2018-01-26 20:43:28</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have boosted the efficiency and stability of the optical rectenna design they developed.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have boosted the efficiency and stability of the optical rectenna design they developed.]]></sentence>  <summary><![CDATA[<p>The research team that announced the first optical rectenna in 2015 is now reporting a two-fold efficiency improvement in the devices &mdash; and a switch to air-stable diode materials. The improvements could allow the rectennas &ndash; which convert electromagnetic fields at optical frequencies directly to electrical current &ndash; to operate low-power devices such as temperature sensors.</p>]]></summary>  <dateline>2018-01-26T00:00:00-05:00</dateline>  <iso_dateline>2018-01-26T00:00:00-05:00</iso_dateline>  <gmt_dateline>2018-01-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>601446</item>          <item>601447</item>          <item>601448</item>      </media>  <hg_media>          <item>          <nid>601446</nid>          <type>image</type>          <title><![CDATA[Testing optical rectenna]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[optical-rectenna-9.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/optical-rectenna-9.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/optical-rectenna-9.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/optical-rectenna-9.jpg?itok=17AJioGg]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Testing an optical rectenna]]></image_alt>                    <created>1516998306</created>          <gmt_created>2018-01-26 20:25:06</gmt_created>          <changed>1516998306</changed>          <gmt_changed>2018-01-26 20:25:06</gmt_changed>      </item>          <item>          <nid>601447</nid>          <type>image</type>          <title><![CDATA[Testing optical rectenna2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[optical-rectenna-11.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/optical-rectenna-11.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/optical-rectenna-11.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/optical-rectenna-11.jpg?itok=UBYWZY4x]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Testing an optical rectenna]]></image_alt>                    <created>1516998423</created>          <gmt_created>2018-01-26 20:27:03</gmt_created>          <changed>1516998423</changed>          <gmt_changed>2018-01-26 20:27:03</gmt_changed>      </item>          <item>          <nid>601448</nid>          <type>image</type>          <title><![CDATA[Optical rectenna researchers]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[optical-rectenna-13.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/optical-rectenna-13.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/optical-rectenna-13.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/optical-rectenna-13.jpg?itok=tmIlUVR_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Baratunde Cola and Erik Anderson]]></image_alt>                    <created>1516998562</created>          <gmt_created>2018-01-26 20:29:22</gmt_created>          <changed>1516998562</changed>          <gmt_changed>2018-01-26 20:29:22</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="149"><![CDATA[Nanotechnology and Nanoscience]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="149"><![CDATA[Nanotechnology and Nanoscience]]></term>      </news_terms>  <keywords>          <keyword tid="142841"><![CDATA[rectenna]]></keyword>          <keyword tid="142851"><![CDATA[optical rectenna]]></keyword>          <keyword tid="213"><![CDATA[energy]]></keyword>          <keyword tid="7294"><![CDATA[diode]]></keyword>          <keyword tid="2616"><![CDATA[antenna]]></keyword>          <keyword tid="5116"><![CDATA[carbon nanotube]]></keyword>          <keyword tid="107"><![CDATA[Nanotechnology]]></keyword>          <keyword tid="8875"><![CDATA[Baratunde Cola]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="600029">  <title><![CDATA[WWII Code-Breaking Techniques Inspire Interpretation of Brain Data]]></title>  <uid>31759</uid>  <body><![CDATA[<p>Cracking the German Enigma code is considered to be one of the decisive factors that hastened Allied victory in World War II. Now researchers have used similar techniques to crack some of&nbsp;the brain&rsquo;s mysterious code.</p><p>By statistically analyzing&nbsp;clues intercepted through espionage, computer science pioneers in the 1940s were able to work out the rules of the Enigma code, turning a string of gibberish characters into&nbsp;plain language to expose German war communications. And today, a team that included <a href="http://dyerlab.gatech.edu/research/" target="_blank">computational neuroscientist Eva Dyer</a>, who recently joined the Georgia Institute of Technology, used cryptographic techniques inspired by Enigma&rsquo;s decrypting to predict, from brain data alone, which direction subjects will move their arms.</p><p>The work by researchers from the University of Pennsylvania, Georgia Tech, and Northwestern University could eventually&nbsp;help decode the neural activity underpinning more complex muscle movements and become useful in prosthetics, or even speech, to aid patients with&nbsp;paralysis.</p><p>During the war, the <a href="http://www.history.com/news/notes-by-alan-turings-team-found-in-the-walls-of-code-breaking-hut" target="_blank">team that cracked Enigma, led by Alan Turing</a>, considered the forebear of modern computer science, analyzed the statistical prevalence of certain letters of the alphabet to understand how they were distributed in messages like points on a map. That allowed the code breakers to eventually decipher whole words reliably.</p><p>In a similar manner, the neurological research team has now mapped the statistical distribution of more prevalent and less prevalent activities in populations of motor neurons to arrive at the specific hand movements driven by that neural activity.</p><p>The research team was led by University of Pennsylvania professor <a href="http://kordinglab.com/">Konrad Kording</a>, and <a href="https://bme.gatech.edu/bme/faculty/Eva-Dyer">Eva Dyer</a>, formerly a postdoctoral researcher in Kording&rsquo;s lab&nbsp;and now an assistant professor at Georgia Tech. They collaborated with the group of Lee Miller, a professor at Northwestern University. They published their <a href="http://rdcu.be/Bafy" target="_blank">study on December 12, 2017, in the journal <em>Nature Biomedical Engineering</em></a>.</p><h4><strong>Neuron firing pattern</strong></h4><p>In an experiment conducted in animal models, the researchers took data from more than one hundred neurons associated with arm movement. As the animals reached for a target that appeared at different locations around a central starting point, sensors recorded spikes of neural activity that corresponded with the movement of the subject&rsquo;s arm.</p><p>&ldquo;Just looking at the raw neural activity on a visual level tells you basically nothing about the movements it corresponds to, so you have to decode it to make the connection,&rdquo; Dyer said. &ldquo;We did it by mapping neural patterns to actual arm movements using machine learning techniques inspired by <a href="https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography" target="_blank">cryptography</a>.&rdquo;</p><p>The statistical prevalence of certain neurons&rsquo; firings paired up reliably and repeatedly with actual movements the way that, in the Enigma project, the prevalence of certain code symbols paired up with the frequency of use of specific letters of the alphabet in written language. In the neurological experiment, an algorithm translated the statistical patterns into visual graphic patterns, and eventually, these aligned with the physical hand movements that they aimed to decode.</p><p>&ldquo;The algorithm tries every possible decoder until we get something where the output looks like typical movements,&rdquo; Kording said. &ldquo;There are issues scaling this up &mdash;&nbsp;it&rsquo;s a hard computer science problem &mdash;&nbsp;but this is a proof-of-concept that <a href="https://www.techopedia.com/definition/1769/cryptanalysis" target="_blank">cryptanalysis</a> can work in the context of neural activity.</p><p>&ldquo;At this point, the cryptanalysis approach is very new and needs refining, but fundamentally, it&rsquo;s a good match for this kind of brain decoding,&rdquo; Dyer said.</p><p>Brain decoding does face&nbsp;a fundamental challenge that code-breaking doesn&#39;t.</p><p>In cryptography, code-breakers have both the encrypted and unencrypted messages, so all they need to do is to figure out which rules turn&nbsp;one into the other. &quot;What we wanted to do in this experiment was to be able to decode the brain from the encrypted message alone,&rdquo; Kording said.</p><p><a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-2-neurons-compute" target="_blank">Hear PODCAST: The Brain, Cosmos in the Cranium, Part II -- neurons&#39; secrets and how they make the brain </a><a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-2-neurons-compute" target="_blank">compute</a></p><h4><strong>Brain-computer interfaces</strong></h4><p>A <a href="https://www.techopedia.com/definition/1769/cryptanalysis" target="_blank">cryptanalysis</a> approach to decoding neural activity is particularly attractive when it comes to brain-computer interfaces that control prosthetics.</p><p>Existing brain-computer interfaces can already use such data to move a robotic prosthesis, but Kording and Dyer&rsquo;s experiment has achieved a significant innovation. Existing technology uses a process known as <a href="https://machinelearningmastery.com/supervised-and-unsupervised-machine-learning-algorithms/" target="_blank">supervised learning</a>,&nbsp;in which the interface can be trained to recognize which neural firings&nbsp;correspond&nbsp;to which intended physical movements, and can thus &ldquo;replay&rdquo; those movements when the subject&#39;s motor neurons produce a&nbsp;pattern the device has been trained to recognize.</p><p>The new research could do away with the training period required for existing <a href="https://computer.howstuffworks.com/brain-computer-interface.htm" target="_blank">brain-computer interfaces</a>&nbsp;to function and allow robotic limbs to directly interpret their user&rsquo;s thoughts without even having to be calibrated. It would represent a significant quality-of-life improvement for patients wearing them.</p><p>&ldquo;Supervised training may sound simple, but actually, it can be long and troublesome, and in the end, it can even fail,&rdquo; Dyer said. &ldquo;For example, if the patient&rsquo;s arm is not paralyzed but instead is missing, it&rsquo;s really hard for the training to work.&rdquo;</p><p>The researchers&rsquo; innovation could mean the difference between a patient straining to mentally picture how the arm should move with possibly cumbersome results, and willfully moving the arm in a virtually natural way.</p><h4><strong>Doorway to mindreading&nbsp;&nbsp;</strong></h4><p>This cryptanalysis approach also offers promise for&nbsp;brain-computer interfaces to achieve literal mind-reading, the way decoding Enigma allowed for reading encrypted texts.</p><p>A patient repeatedly thinking&nbsp;the same sentences would generate neural patterns. &ldquo;We could build a decoder that transforms those patterns until they look&nbsp;like language,&rdquo; Kording said. &ldquo;I think we should be able to do this within the next decade.&rdquo;</p><p>A consistent improvement in <a href="http://www.dummies.com/education/science/biology/brain-recording-techniques/" target="_blank">brain recording technology </a>could help put this goal within reach. This could become useful for patients unable to speak but could also possibly be abused in espionage, Kording warned. But there&#39;s still time to work out the direction future applications take on.</p><p>An evolutionary stroke of luck has made this cryptanalysis approach possible. &ldquo;The brain ended up with this encryption system through natural selection,&rdquo; Kording said. &ldquo;So, it&rsquo;s essentially making the same kind of &lsquo;mistakes&rsquo; that allowed us to crack Enigma in the first place.&rdquo; &nbsp;&nbsp;&nbsp;</p><p>Modern encryption systems are so refined they&rsquo;re impossible to crack. Enigma, on the other hand, was new enough during World War II that it had small imperfections that gave decrypters a pathway into its secrets, making its cracking a fitting inspiration for brain decoding.</p><p><a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-1-molecules" target="_blank">PODCAST: The Brain, Cosmos in the Cranium, Part I - when the brain&#39;s fate hangs by a few molecules</a></p><p><a href="https://soundcloud.com/georgia_tech/the-brain-cosmos-in-the-cranium-part-3-focus-zone-out-get-around" target="_blank">PODCAST: The Brain, Part III - how we get around, how we focus, and how we zone out</a></p><p><em>Researchers Mohammad&nbsp;Gheshlaghi Azar,&nbsp;Hugo L Fernandes, Matthew </em><em>Peich, Stephanie Naufel and Lee Miller of Northwestern University coauthored the study. The work was supported by the National Institute of Neurological Disorders and Stroke through grants R01 NS053603 and R01 NS074044.&nbsp;Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsor.</em></p>]]></body>  <author>Ben Brumfield</author>  <status>1</status>  <created>1513613648</created>  <gmt_created>2017-12-18 16:14:08</gmt_created>  <changed>1513692174</changed>  <gmt_changed>2017-12-19 14:02:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Brain signals are as furtive as the wartime encryption system 'Enigma,' but they can be similarly decrypted as new research shows.]]></teaser>  <type>news</type>  <sentence><![CDATA[Brain signals are as furtive as the wartime encryption system 'Enigma,' but they can be similarly decrypted as new research shows.]]></sentence>  <summary><![CDATA[<p>Nazi communications eluded the Allies via the German encryption system &quot;Enigma&quot; until math and computing whizzes&nbsp;cracked it. Decoding neural activity has felt similarly out of reach, but now computational neuroscientists, inspired by Enigma&#39;s decoding, have begun decrypting brain activity. They have mathematically and algorithmically aligned neuron population firing patterns that drive hand motion with the actual bodily movements.</p>]]></summary>  <dateline>2017-12-18T00:00:00-05:00</dateline>  <iso_dateline>2017-12-18T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-12-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[ben.brumfield@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Writers and media representatives</strong>: Evan Lerner (UPenn) and Ben Brumfield (Georgia Tech)</p><p><strong>Mobile: Evan - (</strong>908) 370-7621<strong>, Ben -&nbsp;</strong>(404-660-1408)</p><p>Evan email:&nbsp;elerner@seas.upenn.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>600014</item>          <item>600035</item>          <item>597504</item>          <item>600019</item>      </media>  <hg_media>          <item>          <nid>600014</nid>          <type>image</type>          <title><![CDATA[Brain decoding research diagram]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Dyer decoding.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Dyer%20decoding.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Dyer%20decoding.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Dyer%2520decoding.jpg?itok=KEqMlCtQ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1513608511</created>          <gmt_created>2017-12-18 14:48:31</gmt_created>          <changed>1513608511</changed>          <gmt_changed>2017-12-18 14:48:31</gmt_changed>      </item>          <item>          <nid>600035</nid>          <type>image</type>          <title><![CDATA[German WWII Enigma machines]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Enigmas.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Enigmas.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Enigmas.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Enigmas.jpg?itok=4v6aUNeV]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1513617114</created>          <gmt_created>2017-12-18 17:11:54</gmt_created>          <changed>1513617114</changed>          <gmt_changed>2017-12-18 17:11:54</gmt_changed>      </item>          <item>          <nid>597504</nid>          <type>image</type>          <title><![CDATA[Eva Dyer with meso-scale brain image]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Dyer-office.small_.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Dyer-office.small_.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Dyer-office.small_.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Dyer-office.small_.jpg?itok=s13YvnTS]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1508251324</created>          <gmt_created>2017-10-17 14:42:04</gmt_created>          <changed>1508256226</changed>          <gmt_changed>2017-10-17 16:03:46</gmt_changed>      </item>          <item>          <nid>600019</nid>          <type>image</type>          <title><![CDATA[Neuron firings decoded into patterns and graphed]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[decoding diagram bc.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/decoding%20diagram%20bc.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/decoding%20diagram%20bc.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/decoding%2520diagram%2520bc.jpg?itok=1ba6cj1E]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1513608974</created>          <gmt_created>2017-12-18 14:56:14</gmt_created>          <changed>1513615200</changed>          <gmt_changed>2017-12-18 16:40:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="176562"><![CDATA[neuron firing pattern]]></keyword>          <keyword tid="176561"><![CDATA[neural activity]]></keyword>          <keyword tid="176563"><![CDATA[motor neurons]]></keyword>          <keyword tid="176560"><![CDATA[neuron population]]></keyword>          <keyword tid="176564"><![CDATA[brain decoding]]></keyword>          <keyword tid="2930"><![CDATA[university of pennsylvania]]></keyword>          <keyword tid="176566"><![CDATA[Northwestern University]]></keyword>          <keyword tid="176565"><![CDATA[enigma]]></keyword>          <keyword tid="176570"><![CDATA[cryptanalysis]]></keyword>          <keyword tid="168112"><![CDATA[cryptography]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="599014">  <title><![CDATA[Imaging Technique Unlocks the Secrets of 17th Century Artists]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The secrets of 17th century artists can now be revealed, thanks to 21st century signal processing. Using modern high-speed scanners and the advanced signal processing techniques, researchers at the Georgia Institute of Technology are peering through layers of pigment to see how painters prepared their canvasses, applied undercoats, and built up layer upon layer of paint to produce their masterpieces.</p><p>The images they produce using the terahertz scanners and the processing technique &ndash; which was mainly developed for petroleum exploration &ndash; provide an unprecedented look at how artists did their work three centuries ago. The level of detail produced by this terahertz reflectometry technique could help art conservators spot previous restorations of paintings, highlight potential damage &ndash; and assist in authenticating the old works.</p><p>Beyond old art, the nondestructive technique also has potential applications for detecting skin cancer, ensuring proper adhesion of turbine blade coatings and measuring the thickness of automotive paints. The study was reported November 8 in the journal <em>Scientific Reports</em>.</p><p>&ldquo;This technique allows us to see at high resolution what is beneath the surface of a painting, to assess in depth what kind of technique has been used, and to determine what defects may be present,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/alexandre-daniel-locquet">Alexandre Locquet</a>, an adjunct professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> and a researcher at the Georgia Tech-CNRS international laboratory in Metz, France. &ldquo;Using this, we can get information that art historians previously did not have, and we can provide information that may be helpful to the conservation and restoration of these old paintings.&rdquo;</p><p>The researchers studied the painting &ldquo;Madonna in Preghiera&rdquo; by the workshop of Giovanni Battista Salvi da Sassoferrato, which was on loan from the Mus&eacute;e de la Cour d&rsquo;Or, Metz M&eacute;tropole, France. The examination began by placing the artwork face down on a gantry device designed to support the canvas without sagging.</p><p>Using a commercial terahertz scanner, the painting was then examined approximately every 200 microns by pulses of terahertz radiation. The scanner consists of an electromagnetic wave generator, which emits signals that penetrated through successive layers of the painting. Portions of the beam reflected back from the paint, producing signals from each layer as the scanner moved across the painting in a raster pattern similar to that used to create television images.</p><p>A computer using a signal processing technique known as sparsity-based time-domain deconvolution then processed the data, separating the signals reflected by each layer to construct a three-dimensional map of the image. The canvas support, ground, imprimatura, underpainting, pictorial and varnish layers were identified, along with a previously unknown restoration of the varnish.</p><p>&ldquo;Our technique is similar to the way in which seismology can be used to identify the various layers of rock in the ground,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/david-s-citrin">David Citrin</a>, a professor in the Georgia Tech School of Electrical and Computer Engineering. &ldquo;In that case, seismologists send in an acoustic pulse and then measure the resulting echoes. In a similar way, we use a pulse of electromagnetic radiation at a frequency of around one terahertz and then look at the reflections off the various layers, a science known as stratigraphy.&rdquo;</p><p>Without the signal processing, researchers might only be able to identify layers 100 to 150 microns thick. But using the advanced processing, they can distinguish layers just 20 microns thick. Paintings done before the 18th century have been challenging to study because their paint layers tend to be thin, Citrin said. Individual pigments cannot be resolved by the technique, though the researchers hope to be able to obtain that information in the future.</p><p>&ldquo;This is really quite significant, because for years people have tried to use raw data, but you really can&rsquo;t see much in that without processing the signals,&rdquo; he said. &ldquo;It takes coupling the terahertz signals with the signal processing to really make a difference.&rdquo;</p><p>Terahertz radiation, also known as submillimeter radiation, operates at tremendously high frequencies. It can easily penetrate layers of paint, though it can be blocked by conductive pigments such as carbon black. The terahertz imaging technique can supplement conventional art analysis techniques such as X-rays, nuclear magnetic resonance imaging, and optical imaging.</p><p>The research team, which included graduate student Junliang Dong and collaborator Marcello Melis, has also studied other paintings, and plans to image a small part of a 12th century wood panel painting. That work will be challenging because the paint is thin and the wood surface damaged.</p><p>Citrin believes the study is the first to detect individual paint layers in a pre-18th century work of art.&nbsp;</p><p>&ldquo;Different techniques provide different information that could be useful to art conservators and historians,&rdquo; he said. &ldquo;Terahertz gives us the combined ability to image a large object relatively quickly and inexpensively. We have shown that you don&rsquo;t need a fancy system to extract useful information.&rdquo;</p><p>Beyond paintings, Citrin&rsquo;s research group has also imaged a Byzantine coin through a thick layer of oxidation, and is attempting to read an inscription in a medieval lead funerary cross also obscured by an oxide layer. They are also collaborating with a research group in Hong Kong to use the technique for characterizing the layers of skin for skin cancer detection and with another group for measuring damage in composite materials.</p><p>&ldquo;Terahertz imaging is still an emerging field that has to find its best applications,&rdquo; said Locquet. &ldquo;We are hoping to contribute to that, and are pleased to apply science and engineering to support the humanities.&rdquo;</p><p><strong>CITATION</strong>: Junliang Dong, Alexandre Locquet, Marcello Melis &amp; D. S. Citrin, &ldquo;Global mapping of stratigraphy of an old-master painting using sparsity-based terahertz reflectometry,&rdquo; (Scientific Reports, 2017) <a href="http://dx.doi.org/10.1038/s41598-017-15069-2">http://dx.doi.org/10.1038/s41598-017-15069-2</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Josh Brown (404-385-0500) (josh.brown@comm.gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1511274429</created>  <gmt_created>2017-11-21 14:27:09</gmt_created>  <changed>1511274806</changed>  <gmt_changed>2017-11-21 14:33:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The secrets of 17th century artists can now be revealed, thanks to 21st century signal processing.]]></teaser>  <type>news</type>  <sentence><![CDATA[The secrets of 17th century artists can now be revealed, thanks to 21st century signal processing.]]></sentence>  <summary><![CDATA[<p>The secrets of 17th century artists can now be revealed, thanks to 21st century signal processing. Using modern high-speed scanners and the advanced signal processing techniques, researchers at the Georgia Institute of Technology are peering through layers of pigment to see how painters prepared their canvasses, applied undercoats, and built up layer upon layer of paint to produce their masterpieces.</p>]]></summary>  <dateline>2017-11-21T00:00:00-05:00</dateline>  <iso_dateline>2017-11-21T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-11-21 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>599008</item>          <item>599009</item>          <item>599010</item>          <item>599011</item>          <item>599012</item>          <item>599013</item>      </media>  <hg_media>          <item>          <nid>599008</nid>          <type>image</type>          <title><![CDATA[David Citrin and Terahertz Image]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[david-citrin_7357.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/david-citrin_7357.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/david-citrin_7357.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/david-citrin_7357.jpg?itok=6AnVtTJd]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[David Citrin with image generated by terahertz technique.]]></image_alt>                    <created>1511273251</created>          <gmt_created>2017-11-21 14:07:31</gmt_created>          <changed>1511273251</changed>          <gmt_changed>2017-11-21 14:07:31</gmt_changed>      </item>          <item>          <nid>599009</nid>          <type>image</type>          <title><![CDATA[David Citrin and Terahertz Image2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[david-citrin_7384.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/david-citrin_7384.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/david-citrin_7384.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/david-citrin_7384.jpg?itok=JVFggJ-o]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[David Citrin with image generated by terahertz technique.]]></image_alt>                    <created>1511273335</created>          <gmt_created>2017-11-21 14:08:55</gmt_created>          <changed>1511273335</changed>          <gmt_changed>2017-11-21 14:08:55</gmt_changed>      </item>          <item>          <nid>599010</nid>          <type>image</type>          <title><![CDATA[False color image of 17th century painting]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[false-color-image.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/false-color-image.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/false-color-image.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/false-color-image.jpg?itok=zZAyQUTH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[False color image of 17th century painting]]></image_alt>                    <created>1511273463</created>          <gmt_created>2017-11-21 14:11:03</gmt_created>          <changed>1511273463</changed>          <gmt_changed>2017-11-21 14:11:03</gmt_changed>      </item>          <item>          <nid>599011</nid>          <type>image</type>          <title><![CDATA[“Madonna in Preghiera”]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[painting.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/painting.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/painting.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/painting.jpg?itok=KcNddpgv]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Painting “Madonna in Preghiera”]]></image_alt>                    <created>1511273638</created>          <gmt_created>2017-11-21 14:13:58</gmt_created>          <changed>1511273638</changed>          <gmt_changed>2017-11-21 14:13:58</gmt_changed>      </item>          <item>          <nid>599012</nid>          <type>image</type>          <title><![CDATA[Edge of Painting]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[figure-edge.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/figure-edge.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/figure-edge.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/figure-edge.jpg?itok=_oiZGoh8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Edge of painting shows layers]]></image_alt>                    <created>1511273770</created>          <gmt_created>2017-11-21 14:16:10</gmt_created>          <changed>1511273770</changed>          <gmt_changed>2017-11-21 14:16:10</gmt_changed>      </item>          <item>          <nid>599013</nid>          <type>image</type>          <title><![CDATA[Alexandre Locquet]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GTL-2015-314_unpeusouriant_fullres_cadre - Copy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/GTL-2015-314_unpeusouriant_fullres_cadre%20-%20Copy.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/GTL-2015-314_unpeusouriant_fullres_cadre%20-%20Copy.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/GTL-2015-314_unpeusouriant_fullres_cadre%2520-%2520Copy.jpg?itok=nqdtYPjj]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Alexandre Locquet]]></image_alt>                    <created>1511273929</created>          <gmt_created>2017-11-21 14:18:49</gmt_created>          <changed>1511273929</changed>          <gmt_changed>2017-11-21 14:18:49</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="7678"><![CDATA[Terahertz]]></keyword>          <keyword tid="176322"><![CDATA[terahertz reflectometry]]></keyword>          <keyword tid="987"><![CDATA[imaging]]></keyword>          <keyword tid="6865"><![CDATA[artist]]></keyword>          <keyword tid="125"><![CDATA[art]]></keyword>          <keyword tid="6258"><![CDATA[painting]]></keyword>          <keyword tid="172930"><![CDATA[David Citrin]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="598036">  <title><![CDATA[“Combosquatting” Attack Hides in Plain Sight to Trick Computer Users]]></title>  <uid>27303</uid>  <body><![CDATA[<p>To guard against unknowingly visiting malicious websites, computer users have been taught to double-check website URLs before they click on a link. But attackers are now taking advantage of that practice to trick users into visiting website domains that contain familiar trademarks &mdash; but with additional words that change the destination to an attack site.</p><p>For example, attackers might register www.familiarbankname-security[.]com or www.security-familiarbankname[.]com. Unwary users see the familiar bank name in the URL, but the additional hyphenated word means the destination is very different from what was expected. The result could be counterfeit merchandise, stolen credentials, a malware infection &ndash; or another computer conscripted into a botnet attack.</p><p>The attack strategy, known as combosquatting, is a growing threat, with millions of such domains set up for malicious purposes, according to a new study scheduled to be presented October 31 at the 2017 ACM Conference on Computer and Communications Security (CCS).&nbsp;</p><p>&ldquo;This is a tactic that the adversaries are using more and more because they have seen that it works,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/manos-antonakakis">Manos Antonakakis</a>, an assistant professor in the <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. &ldquo;This attack is hiding in plain sight, but many people aren&rsquo;t computer-savvy enough to notice the difference in the URLs containing familiar trademarked names.&rdquo;</p><p>Researchers from Georgia Tech and Stony Brook University conducted the study, which is believed to be the first large-scale, empirical study of combosquatting. The work was supported by U.S. Department of Defense agencies, the National Science Foundation and the U.S. Department of Commerce.</p><p>Combosquatting differs from its better-known relative, typosquatting, in which adversaries register variations of URLs that users are likely to type incorrectly. Combosquatting domains don&rsquo;t depend on victims making typing errors, but instead provide malicious links embedded in emails, web advertising or the results of web searches. Combosquatting attackers often combine the trademarked name with a term designed to convey a sense of urgency to encourage victims to click on what appears at first glance to be a legitimate link.</p><p>&ldquo;We have seen combosquatting used in virtually every kind of cyberattack that we know of, from drive-by downloads to phishing attacks by nation-states,&rdquo; said Panagiotis Kintis, a Georgia Tech graduate research assistant who is the first author of the study. &ldquo;These attacks can even fool security people who may be looking at network traffic for malicious activity. When they see a familiar trademark, they may feel a false sense of comfort with it.&rdquo;</p><p>For their study, the researchers began with the 500 most popular trademarked domain names in the United States, and excluded certain combinations made up of common words. They separated the domains into 20 categories, then added two additional domains: one for for politics &ndash; the study was done before the 2016 election &ndash; and another for energy.&nbsp;</p><p>With the resulting 268 trademark-containing URLs, they set out to find domain names that incorporated the trademarked name with additional words added at the start or end. They searched through six years of active and passive domain name system (DNS) requests &ndash; more than 468 billion records &ndash; provided by one of the largest internet service providers in North America.</p><p>&ldquo;The result was mind-blowing,&rdquo; said Kintis. &ldquo;We found orders of magnitude more combosquatting domains than typosquatting domains, for instance. The space for combosquatting is almost infinite because attackers can register as many domains as they want with any variation that they want. In some cases, registering a domain can cost less than a dollar.&rdquo;</p><p>In the six-year data set, the researchers found 2.7 million combosquatting domains for the 268 popular trademarks alone, and the combosquatting domains were 100 times more prevalent than typosquatting domains. The combosquatting attacks appear to be challenging to combat, with nearly 60 percent of the abusive domains in operation for more than 1,000 days &ndash; almost three years. And the number of combosquatting domains registered grew every year between 2011 and 2016.</p><p>Among the malicious domains, the researchers discovered some that had previously been registered by legitimate companies which had combined words with their trademarks. For some reason, those companies permitted the registrations to lapse, allowing the trademark-containing domain names &ndash; which once led to legitimate sites &ndash; to be taken over by combosquatting attackers.&nbsp;</p><p>In many cases, malicious domains were re-registered multiple times after they had expired, suggesting an improvement in &ldquo;internet hygiene&rdquo; may be needed to address this threat.</p><p>&ldquo;Imagine what happens in a city when the garbage isn&rsquo;t picked up regularly,&rdquo; Antonakakis said. &ldquo;The garbage builds up and you have diseases develop. Nobody collects the garbage domains on the internet, because it&rsquo;s nobody&rsquo;s job. But there should be an organization that would collect these malicious domains so they cannot be reused to infect people.&rdquo;</p><p>More stringent anti-fraud screening of persons registering domains would also help, he added. &ldquo;We don&rsquo;t want to prevent legitimate users from getting onto the internet, but there are warning signs of potential fraud that registrars could detect.&rdquo;</p><p>What can be done by ordinary computer users and the organizations where they work?&nbsp;</p><p>&ldquo;Users unfortunately have to be better educated than they are now,&rdquo; Antonakakis said. &ldquo;Organizations can provide training in the on-boarding process that takes place for new employees, and they can protect their network perimeters to prevent users from being exposed to known combosquatting domains. More needs to be done to address this growing cybersecurity problem.&rdquo;</p><p>In addition to those already mentioned, the research included Najmeh Miramirkhani and Nick Nikiforakis from Stony Brook University; Charles Lever, Yizheng Chen and Rosa Romero-G&oacute;mez from Georgia Tech, and Nikolaos Pitropakis from London South Bank University.</p><ul><li><a href="http://iisp.gatech.edu/georgia-tech-acm-ccs-2017">Summaries</a> of Georgia Tech research being presented at the 2017 ACM Conference on Computer and Communications Security.</li></ul><p><strong>CITATION</strong>: Panagiotis Kintis, et al., &ldquo;Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse,&rdquo; (2017 ACM Conference on Computer and Communications Security). https://arxiv.org/abs/1708.08519</p><p><em>This material is based upon work supported in part by the U.S. Department of Commerce under grants 2106DEK and 2106DZD; the National Science Foundation (NSF) under grants 2106DGX, CNS-1617902, CNS-1617593, and CNS-1735396; the Air Force Research Laboratory/Defense Advanced Research Projects Agency under grant 2106DTX; and the Office of Naval Research (ONR) under grant N00014-16-1-2264. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (404-660-1408) (ben.brumfield@comm.gatech.edu)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1509239559</created>  <gmt_created>2017-10-29 01:12:39</gmt_created>  <changed>1509389501</changed>  <gmt_changed>2017-10-30 18:51:41</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Attackers are tricking computer users with URLs that are similar to those of real companies.]]></teaser>  <type>news</type>  <sentence><![CDATA[Attackers are tricking computer users with URLs that are similar to those of real companies.]]></sentence>  <summary><![CDATA[<p>To guard against unknowingly visiting malicious websites, computer users have been taught to double-check website URLs before they click on a link. But attackers are now taking advantage of that practice to trick users into visiting website domains that contain familiar trademarks &mdash; but with additional words that change the destination to an attack site.</p>]]></summary>  <dateline>2017-10-30T00:00:00-04:00</dateline>  <iso_dateline>2017-10-30T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-10-30 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>598032</item>          <item>598034</item>          <item>598035</item>      </media>  <hg_media>          <item>          <nid>598032</nid>          <type>image</type>          <title><![CDATA[Number of combosquatted domains]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[combo-squatted_7087.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/combo-squatted_7087.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/combo-squatted_7087.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/combo-squatted_7087.jpg?itok=Dp0yAI9a]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chart showing number of combosquatted domains]]></image_alt>                    <created>1509238879</created>          <gmt_created>2017-10-29 01:01:19</gmt_created>          <changed>1509238879</changed>          <gmt_changed>2017-10-29 01:01:19</gmt_changed>      </item>          <item>          <nid>598034</nid>          <type>image</type>          <title><![CDATA[Examples of combosquatted domains]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bad-domains2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bad-domains2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bad-domains2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bad-domains2.jpg?itok=ve4pkq-E]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Examples of combosquatted domains]]></image_alt>                    <created>1509238995</created>          <gmt_created>2017-10-29 01:03:15</gmt_created>          <changed>1509238995</changed>          <gmt_changed>2017-10-29 01:03:15</gmt_changed>      </item>          <item>          <nid>598035</nid>          <type>image</type>          <title><![CDATA[Server cabinet]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[server-wires.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/server-wires.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/server-wires.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/server-wires.jpg?itok=ahqZlkVI]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cables in a server cabinet]]></image_alt>                    <created>1509239100</created>          <gmt_created>2017-10-29 01:05:00</gmt_created>          <changed>1509239100</changed>          <gmt_changed>2017-10-29 01:05:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="176089"><![CDATA[combosquatting]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="176088"><![CDATA[cyberattack]]></keyword>          <keyword tid="173795"><![CDATA[Manos Antonakakis]]></keyword>          <keyword tid="176093"><![CDATA[URL]]></keyword>          <keyword tid="176092"><![CDATA[domain name]]></keyword>          <keyword tid="176087"><![CDATA[intrusion]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="598030">  <title><![CDATA[“Instant Replay” for Computer Systems Shows Cyber Attack Details]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Until now, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process. A new software system being developed by cybersecurity researchers at the Georgia Institute of Technology will largely automate that process, allowing investigators to quickly and accurately pinpoint how intruders entered the network, what data they took and which computer systems were compromised.</p><p>Known as Refinable Attack INvestigation (RAIN), the system will provide forensic investigators a detailed record of an intrusion, even if the attackers attempted to cover their tracks. The system provides multiple levels of detail, facilitating automated searches through information at a high level to identify the specific events for which more detailed data is reproduced and analyzed.</p><p>&ldquo;You can go back and find out what has gone wrong in your system, not just at the point where you realized that something is wrong, but far enough back to figure out how the attacker got into the system and what has been done,&rdquo; said <a href="http://www.iisp.gatech.edu/wenke-lee">Wenke Lee</a>, co-director of Georgia Tech&rsquo;s <a href="http://www.iisp.gatech.edu/">Institute for Information Security &amp; Privacy</a>.&nbsp;</p><p>The research, supported largely by the Defense Advanced Research Projects Agency (DARPA) and also by the National Science Foundation and Office of Naval Research, is scheduled to be reported October 31 at the 2017 ACM Conference on Computer and Communications Security (CCS).</p><p>Existing forensic techniques can provide detailed information about the current status of computers and networks; from that information, investigators can then attempt to infer how attacks unfolded. Digital logs maintained by the systems provide some information about attacks, but because of concerns about data storage issues, usually don&rsquo;t record enough detail. Other programs provide snapshots in time, but those snapshots may miss important details of an attack.</p><p>The RAIN system continuously monitors a system and logs events that it recognizes as potentially interesting. That ability to selectively record information likely to be useful later allows a trade-off between realistic overhead &ndash; in terms of system performance and data storage &ndash; and useful levels of detail. The system &ldquo;effectively prunes out unrelated processes and determines attack causality with negligible false positive rates,&rdquo; the authors wrote in their conference paper.&nbsp;</p><p>In addition to its selectivity in recording events, RAIN creates a multi-level review capability that is coarse at first, then more detailed when specific events of interest are identified. Timing of the activities &ndash; the inputs, environment and resulting actions &ndash; are also synchronized to help investigators understand a complex sequence of activities.</p><p>&ldquo;During the replay of an event, we use binary dynamic instrumentation tools to do the extraction of the appropriate information,&rdquo; said <a href="https://www.scs.gatech.edu/people/10811/taesoo-kims">Taesoo Kim</a>, an assistant professor in Georgia Tech&rsquo;s <a href="https://www.scs.gatech.edu/">School of Computer Science</a> and one of the paper&rsquo;s co-authors. &ldquo;We organize information in a hierarchical way, and for each level apply a different type of automated analysis. At the deepest layer, we can tell what happened at the byte level.&rdquo;</p><p>The hierarchical approach allows still more flexibility in how the analysis is done after an attack.</p><p>&ldquo;These fine-grained analyses, which can be extremely useful when investigating an attack, would be too expensive to perform on a deployed system; but our hierarchical approach allows us to run these analysis off-line, and only when necessary,&rdquo; said <a href="https://www.scs.gatech.edu/people/10892/alessandro-orsos">Alessandro Orso</a>, associate chair of Georgia Tech&rsquo;s School of Computer Science and another co-author.</p><p>Even with RAIN&rsquo;s selectivity, storing the relevant information requires significant capacity, but the advent of inexpensive storage makes that practical, said Kim. For instance, an average desktop computer might generate four gigabytes of system data per day, less than two terabytes per year. That amount of storage can now be purchased for as little as $50 per year.</p><p>&ldquo;I think we are getting into an affordable range of storage cost,&rdquo; Kim said.</p><p>Assessing the damage done by intruders now often takes weeks or months. Beyond accelerating that process, RAIN could help the operators of high-value military or commercial computer networks continually improve their security by providing a level of visibility that is impossible today, Lee said.</p><p>&ldquo;When this is deployed, organizations can have complete transparency, or visibility, about what went wrong,&rdquo; he explained. &ldquo;The operators of any network housing important data would want to have something like this to replace a manual process with a much more precise and automated technique.&rdquo;</p><p>The research team is in the third year of a four-year project funded by DARPA. Additional improvements are being made to the system with a goal of transitioning it to industry.</p><p>&ldquo;This would likely become an independent system that does the logging and interface for other security systems to understand what has happened,&rdquo; Lee explained. &ldquo;This could be the first product that actually logs the necessary information to reconstruct, or replay, and analyze events that have happened on a computer system, for the first time enabling automated forensics.&rdquo;</p><p>In addition to those already mentioned, the research team included Yang Ji, Sangho Lee, Evan Downing, Weiren Wang and Mattia Fazzini, all from Georgia Tech.</p><ul><li><a href="http://iisp.gatech.edu/georgia-tech-acm-ccs-2017">Summaries</a> of Georgia Tech research being presented at the 2017 ACM Conference on Computer and Communications Security.</li></ul><p><em>This research was supported by the NSF under awards CNS-0831300, CNS-1017265, DGE-1500084, CCF-1548856, CNS-1563848, SFS-1565523, CRI-1629851, CNS-1704701, CCF-0541080, and CCR-0205422; by the ONR through grants N000140911042 and N000141512162, and by DARPA TC through grants FA8650-15-C-7556 and HR0011-16-C-0059, NRF BSRP/MOE 2017R1A6A3A03002506. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsor agencies.</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (404-660-1408) (ben.brumfield@comm.gatech.edu)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1509238572</created>  <gmt_created>2017-10-29 00:56:12</gmt_created>  <changed>1509386133</changed>  <gmt_changed>2017-10-30 17:55:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new cybersecurity system provides investigators with an instant replay of attacks.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new cybersecurity system provides investigators with an instant replay of attacks.]]></sentence>  <summary><![CDATA[<p>Until now, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process. A new software system being developed by cybersecurity researchers at the Georgia Institute of Technology will largely automate that process, allowing investigators to quickly and accurately pinpoint how intruders entered the network, what data they took and which computer systems were compromised.</p>]]></summary>  <dateline>2017-10-30T00:00:00-04:00</dateline>  <iso_dateline>2017-10-30T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-10-30 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>598028</item>          <item>598029</item>      </media>  <hg_media>          <item>          <nid>598028</nid>          <type>image</type>          <title><![CDATA[RAIN cybersecurity system]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[directory.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/directory.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/directory.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/directory.jpg?itok=tElbPSrg]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Directory of a computer]]></image_alt>                    <created>1509237782</created>          <gmt_created>2017-10-29 00:43:02</gmt_created>          <changed>1509237782</changed>          <gmt_changed>2017-10-29 00:43:02</gmt_changed>      </item>          <item>          <nid>598029</nid>          <type>image</type>          <title><![CDATA[RAIN cybersecurity system schematic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[rain-schematic_7118.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/rain-schematic_7118.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/rain-schematic_7118.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/rain-schematic_7118.jpg?itok=d6wPWasE]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Schematic of RAIN system]]></image_alt>                    <created>1509237898</created>          <gmt_created>2017-10-29 00:44:58</gmt_created>          <changed>1509237898</changed>          <gmt_changed>2017-10-29 00:44:58</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="176088"><![CDATA[cyberattack]]></keyword>          <keyword tid="98601"><![CDATA[hacking]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="176087"><![CDATA[intrusion]]></keyword>          <keyword tid="439"><![CDATA[computer]]></keyword>          <keyword tid="145981"><![CDATA[IISP]]></keyword>          <keyword tid="10893"><![CDATA[wenke lee]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="596491">  <title><![CDATA[Students Selected as Finalists in National Invention Competition]]></title>  <uid>27918</uid>  <body><![CDATA[<p>An invention from Georgia Tech students that makes it easier to locate items in large warehouses is a finalist for the 2017 Collegiate Inventors Competition, which honors the nation&rsquo;s top collegiate inventors.</p><p>Sarthak Srinivas, a computer science major, and Charu Thomas, an industrial engineering major, lead the team behind <a href="http://oculogx.com/">Oculogx</a>, which streamlines the steps it takes to locate and handle items in warehouses. It&nbsp;is a mixed-reality application used with a headset that combines barcode scanning for immediate inventory control with navigation that projects the optimal path through the&nbsp;warehouse to each item.</p><p>An earlier iteration, called PickAR, was a <a href="http://www.news.gatech.edu/2017/03/14/bringing-augmented-reality-warehouses">finalist</a> for the 2017 <a href="https://inventureprize.gatech.edu/">InVenture Prize</a>, Georgia Tech&rsquo;s annual invention competition.</p><p>The application recently <a href="https://imagine.microsoft.com/en-us/Team/Index/5cb5f8d5-f477-4463-83f1-2ae1ebfe1b48">finished second in the Imagine Cup</a>, a worldwide innovation competition sponsored by Microsoft.</p><p>Two other computer science majors, Cheng Hann and<strong> </strong>Wenqi Xian, were part of the team during InVenture and assisted with the Microsoft contest.</p><p>&ldquo;We have never forgotten how helpful our mentors and peers at Georgia Tech and the <a href="http://create-x.gatech.edu/">CREATE-X</a> program have been,&rdquo; Srinivas said. &ldquo;We have made a lot of great progress on our product and have migrated to a new development environment based on Android.&rdquo;</p><p>As part of the <a href="http://collegiateinventors.org/">Collegiate Inventors Competition</a>, teams will travel to Washington, D.C., for the event, which will take place from Nov. 1-3. The judges include National Inventors Hall of Fame inductees and leaders from the United States Patent and Trademark Office. Student winners and their advisors will be awarded cash and prizes ranging from $2,500 to $10,000.</p><p>The competition, which started in 1990, is considered one of the nation&rsquo;s foremost competitions encouraging innovation, entrepreneurship, and creativity by recognizing and rewarding college students working on cutting-edge inventions.</p><p>Oculogyx also recently won the <a href="https://atlantastartupbattle.com/">Atlanta Startup Battle</a>, which awarded the company $100,000.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1506436259</created>  <gmt_created>2017-09-26 14:30:59</gmt_created>  <changed>1507123190</changed>  <gmt_changed>2017-10-04 13:19:50</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Team's invention makes it easier to manage warehouse inventory. Oculogx is competing in 2017 Collegiate Inventors Competition. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Team's invention makes it easier to manage warehouse inventory. Oculogx is competing in 2017 Collegiate Inventors Competition. ]]></sentence>  <summary><![CDATA[<p>Team&#39;s invention makes it easier to manage warehouse inventory. Oculogx is competing in 2017 Collegiate Inventors Competition.&nbsp;</p>]]></summary>  <dateline>2017-09-26T00:00:00-04:00</dateline>  <iso_dateline>2017-09-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-09-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>588632</item>      </media>  <hg_media>          <item>          <nid>588632</nid>          <type>image</type>          <title><![CDATA[Oculogx]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[InventureMediaDay-016.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/InventureMediaDay-016.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/InventureMediaDay-016.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/InventureMediaDay-016.jpg?itok=e93BI0RX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1489419806</created>          <gmt_created>2017-03-13 15:43:26</gmt_created>          <changed>1506446659</changed>          <gmt_changed>2017-09-26 17:24:19</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="3472"><![CDATA[entrepreneurship]]></keyword>          <keyword tid="169753"><![CDATA[student startups]]></keyword>          <keyword tid="137161"><![CDATA[CREATE-X]]></keyword>          <keyword tid="12350"><![CDATA[Georgia Tech InVenture Prize]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="596906">  <title><![CDATA[Georgia Tech Researchers Support DARPA’s New “CHIPS” Initiative]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A team of Georgia Tech researchers is bringing electronic design software and communications expertise to DARPA&#39;s new <a href="https://www.darpa.mil/news-events/2017-08-25">CHIPS initiative</a>, which will enable future generations of integrated circuits to be assembled from plug-and-play modules known as &ldquo;chiplets.&rdquo; Reusing blocks of existing microelectronics technology could reduce the need to design complex monolithic chips from scratch for new applications.</p><p>By allowing components such as memory modules or signal processors to be easily fitted together like the parts of a jigsaw puzzle, the initiative could help reduce the cost of new ICs for Department of Defense (DoD) agencies and accelerate the application of new technology. While the initiative is driven by DoD needs for its ships, tanks and aircraft, innovations developed by the program could also reduce the cost of developing low-volume specialized devices in the commercial world.</p><p>&ldquo;The goal of this program is to make the design more modular so we can reuse existing components, making the design process much faster, easier and cheaper,&rdquo; said <a href="http://limsk.ece.gatech.edu/">Sung Kyu Lim</a>, a <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> professor who heads up Georgia Tech&rsquo;s part of the initiative. &ldquo;We&rsquo;ll be able to create new chips to meet specific needs by reusing these chiplets and putting them together in modular fashion. The modular design will allow us to pick and choose the components we need for specific applications.&rdquo;&nbsp;</p><p>Monolithic integrated circuits like those that go into smartphones contain billions of transistors. They cost tens to hundreds of millions of dollars and take months to design. Companies selling large volumes of consumer products can afford that design cost, but DoD agencies that need smaller numbers of specialized devices are looking for ways to reduce the design cost and time required.</p><p>Enter DARPA&rsquo;s Common Heterogeneous Integration and Intellectual Property Reuse Strategies (CHIPS) effort, which will use interposer technology &ndash; a silicon and copper interface &ndash; that will interconnect the chiplets. While the interposer adds a level of complexity to the design of the devices, it&rsquo;s necessary to facilitate the 3-D modular assembly. The chiplets themselves could arise from existing designs, with engineers modifying memory, signal processing and other blocks from ICs already in production.</p><p>&ldquo;Instead of designing a whole new chip, you can borrow from what&rsquo;s already been designed to put together a new chip quickly and at lower cost,&rdquo; said Lim, who holds the Dan Fielder Endowed Chair. The chiplets would be assembled and then packaged together, facilitating shorter interconnect lengths that would reduce communication time and energy consumption between the components. The modular nature of the chiplets would also allow a block to be replaced by new technology without redesigning an entire IC.</p><p>The four-year CHIPS effort involves 11 teams, including major defense contractors, microelectronics companies, design firms &ndash; and two other universities: the University of Michigan and North Carolina State University. In addition to Lim, the Georgia Tech effort will involve three other faculty members: Pippin Chair Professor <a href="https://www.ece.gatech.edu/faculty-staff-directory/madhavan-swaminathan">Madhavan Swaminathan</a>, Professor <a href="https://www.ece.gatech.edu/faculty-staff-directory/saibal-mukhopadhyay">Saibal Mukhopadhyay</a> and Assistant Professor <a href="https://www.ece.gatech.edu/faculty-staff-directory/tushar-krishna">Tushar Krishna</a>, all from the School of Electrical and Computer Engineering.</p><p>About $3.7 million will come to Georgia Tech as part of the project&rsquo;s budget. In addition to the faculty members, that will fund a research engineer and up to eight graduate students.</p><p>The Georgia Tech team will provide electronic design automation software needed to produce the chiplets, develop translator technology that will allow chiplets operating in different languages to communicate, and evaluate different design standards brought to the project by other teams.</p><ul><li>Circuit design tools will be needed to create the chiplets, many of which will be adapted from existing designs. &ldquo;A big part of what we&rsquo;ll deliver for this project is electronic design automation (EDA) tools,&rdquo; said Lim. &ldquo;We want to automate the entire chiplet generation and integration process as much as possible using algorithms and software tools.&rdquo;</li><li>Modules from different companies may use different languages. To use them together in a new system, the chiplets will need translators, circuitry and software that will wrap around each chiplet. &ldquo;We need to understand all the different languages, so we can help the chiplets communicate with one another,&rdquo; Lim explained. &ldquo;The complexity will depend on how many interface protocols are used in the system.&rdquo;</li><li>The project teams will have to work together using the same design standards. Lim&rsquo;s team will establish tools and techniques for evaluating the different standards now used by different teams that are part of the overall effort. &ldquo;We will provide a fair means of comparing the different technology options and picking the winner,&rdquo; said Lim.</li></ul><p>Though DARPA&rsquo;s focus is on providing technology for DoD users, solutions developed from the initiative could also have broad benefits in the commercial microelectronics world. &ldquo;Small- and medium-sized companies could will benefit a lot from this,&rdquo; Lim said. &ldquo;Small design houses that would like to develop their own ICs will likely be very interested.&rdquo;</p><p>Meeting the program&rsquo;s ambitious goals will be challenging, Lim says, with reliability, power, mechanical and thermal issues on the horizon. &ldquo;The success of this program will make a significant contribution to the defense industry and the microelectronics community in general,&rdquo; he said.</p><p><em>Research described in this news release is supported by the Defense Advanced Research Projects Agency under award N00014-17-1-2950. The content of the information does not necessarily reflect the position or the policy of the Government, and no official endorsement should be inferred.</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (404-660-1408) (ben.brumfield@comm.gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1507060677</created>  <gmt_created>2017-10-03 19:57:57</gmt_created>  <changed>1507064494</changed>  <gmt_changed>2017-10-03 21:01:34</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech is contributing to the DARPA CHIPS initiative to reuse microelectronic designs.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech is contributing to the DARPA CHIPS initiative to reuse microelectronic designs.]]></sentence>  <summary><![CDATA[<p>A team of Georgia Tech researchers is bringing electronic design software and communications expertise to DARPA&#39;s new CHIPS initiative, which will enable future generations of integrated circuits to be assembled from plug-and-play modules known as &ldquo;chiplets.&rdquo; Reusing blocks of existing microelectronics technology could reduce the need to design complex monolithic chips from scratch for new applications.</p>]]></summary>  <dateline>2017-10-03T00:00:00-04:00</dateline>  <iso_dateline>2017-10-03T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-10-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>596902</item>          <item>596912</item>      </media>  <hg_media>          <item>          <nid>596902</nid>          <type>image</type>          <title><![CDATA[Plug and play chiplets could be the basis for future devices]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Chips-DARPA-Update.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Chips-DARPA-Update.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Chips-DARPA-Update.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Chips-DARPA-Update.jpg?itok=p_9M1LGX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Schematic of chiplet assembly]]></image_alt>                    <created>1507059531</created>          <gmt_created>2017-10-03 19:38:51</gmt_created>          <changed>1507059531</changed>          <gmt_changed>2017-10-03 19:38:51</gmt_changed>      </item>          <item>          <nid>596912</nid>          <type>image</type>          <title><![CDATA[Connecting chiplets on silicon interposer]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[all-final.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/all-final.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/all-final.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/all-final.jpg?itok=ML98FVp3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chiplets on silicon interposer.]]></image_alt>                    <created>1507064445</created>          <gmt_created>2017-10-03 21:00:45</gmt_created>          <changed>1507064445</changed>          <gmt_changed>2017-10-03 21:00:45</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="175758"><![CDATA[chiplets]]></keyword>          <keyword tid="175762"><![CDATA[chips]]></keyword>          <keyword tid="2832"><![CDATA[microelectronics]]></keyword>          <keyword tid="175763"><![CDATA[electronic design software]]></keyword>          <keyword tid="2183"><![CDATA[communications]]></keyword>          <keyword tid="63161"><![CDATA[integrated circuits]]></keyword>          <keyword tid="433"><![CDATA[IC]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39461"><![CDATA[Manufacturing, Trade, and Logistics]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="594502">  <title><![CDATA[Print No Evil: Three-Layer Technique Helps Secure Additive Manufacturing]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Additive manufacturing, also known as 3-D printing, is replacing conventional fabrication processes in critical areas ranging from aerospace components to medical implants. But because the process relies on software to control the 3-D printer, additive manufacturing could become a target for malicious attacks &ndash; as well as for unscrupulous operators who may cut corners.</p><p>Researchers from the Georgia Institute of Technology and Rutgers University have developed a three-layer system to verify that components produced using additive manufacturing have not been compromised. Their system uses acoustic and other physical techniques to confirm that the printer is operating as expected, and nondestructive inspection techniques to verify the correct location of tiny gold nanorods buried in the parts. The validation technique is independent of printer firmware and software in the controlling computer.</p><p>The verification and intrusion detection research will be described August 18 at the <a href="https://www.usenix.org/conference/usenixsecurity17">26th USENIX Security Symposium</a> in Vancouver, British Columbia. The two institutions recently received a grant from the National Science Foundation to further develop the process described at the symposium.</p><p>&ldquo;These 3-D printed components will be going into people, aircraft and critical infrastructure systems,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/raheem-a-beyah">Raheem Beyah</a>, the Motorola Foundation Professor and associate chair in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>. &ldquo;Malicious software installed in the printer or control computer could compromise the production process. We need to make sure that these components are produced to specification and not affected by malicious actors or unscrupulous producers.&rdquo;</p><p>The three components of the new system include:</p><ul><li><strong>Acoustic measurement of the 3-D printer in operation</strong>. When compared to a reference recording of a correct print, this acoustic monitoring &ndash; done with an inexpensive microphone and filtering software &ndash; can detect changes in the printer&rsquo;s sound that may indicate installation of malicious software.&nbsp;</li><li><strong>Physical tracking of printer components</strong>. To create the desired object, the printer&rsquo;s extruder and other components should follow a consistent mechanical path that can be observed with inexpensive sensors. Variations from the expected path could indicate an attack.</li><li><strong>Detection of nanorods in finished components</strong>. Using Raman Spectroscopy and computed tomography (CT), the researchers were able to detect the location of gold nanorods that had been mixed with the filament material used in the 3-D printer. Variations from the expected location of those particles could indicate a quality problem with the component. The variations could result from malicious activity, or from efforts to conserve printer materials. &nbsp;</li></ul><p>The researchers tested their technique on three different types of 3-D printers and a computer numerical control (CNC) machine using a polyethylene tibial knee prosthesis as a test case. Beyond detecting malicious activity or quality problems, the technique could stop inadvertent production problems, reducing materials waste.</p><p>In their technique to detect flaws in 3-D printed components, the researchers were inspired to apply the same kind of contrast agents used in medical imaging techniques for detecting tumors, said Mehdi Javanmard, assistant professor in the Department of Electrical and Computer Engineering at Rutgers University.</p><p>The gold contrast materials were tested to make sure they wouldn&rsquo;t compromise the structural integrity of the printed components.&nbsp;</p><p>Now that they&rsquo;ve demonstrated the feasibility of the techniques, the researchers plan to use the NSF funding awarded August 1 to improve the validation methods and move them closer to application. &ldquo;Our focus now will be on testing the resilience of this technology and its resistance to intrusion and malicious attacks,&rdquo; Javanmard said.</p><p>Among the challenges ahead will be obtaining good acoustic data in the noisy environments in which 3-D printers typically operate. In the research reported by the researchers, operation of other 3-D printers near the one being observed cut the accuracy significantly, but Beyah believes that challenge can be addressed with additional signal processing. The technique will also be applied to additional types of printers, and to different materials.</p><p>With the capabilities of 3-D printers growing and their cost declining, Beyah believes the use of additive manufacturing techniques will continue to expand. The validation and intrusion detection system will therefore become more critical.</p><p>&ldquo;The idea that additive manufacturing processes could be compromised to intentionally hurt someone hasn&rsquo;t really been considered with some of these applications,&rdquo; he said. &ldquo;There is a good bit of room to improve the security of 3-D printers, and we think that will start with applications that are closest to humans, such as implants and medical devices.&rdquo;</p><p>In addition to those already mentioned, the research included Christian Bayens from Georgia Tech, and Saman Zonouz, Tuan Le, and Luis Garcia from Rutgers University.</p><p>CITATION: Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard and Saman Zonouz, &ldquo;See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing,&rdquo; (26th USENIX Security Symposium, August 18, 2017). <a href="https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/bayens">https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/bayens</a></p><p><em>Research described in this news release is being funded under award 1739259 from the National Science Foundation. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (jtoon@gatech.edu) (404-894-6986) or Josh Brown (josh.brown@comm.gatech.edu) (404-385-0500).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1502897124</created>  <gmt_created>2017-08-16 15:25:24</gmt_created>  <changed>1502897426</changed>  <gmt_changed>2017-08-16 15:30:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a three-layer technique for protecting the additive manufacturing (3-D printing) process.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a three-layer technique for protecting the additive manufacturing (3-D printing) process.]]></sentence>  <summary><![CDATA[<p>Researchers from Georgia Tech and Rutgers University have developed a three-layer technique for protecting the additive manufacturing (3-D printing) process from malicious attack.</p>]]></summary>  <dateline>2017-08-16T00:00:00-04:00</dateline>  <iso_dateline>2017-08-16T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-08-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>594498</item>          <item>594500</item>      </media>  <hg_media>          <item>          <nid>594498</nid>          <type>image</type>          <title><![CDATA[Raheem Beyah in 3-D Printing Lab]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[additive-manufacturing-0277.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/additive-manufacturing-0277.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/additive-manufacturing-0277.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/additive-manufacturing-0277.jpg?itok=PiBxxgfX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Raheem Beyah in 3-D printing lab]]></image_alt>                    <created>1502896597</created>          <gmt_created>2017-08-16 15:16:37</gmt_created>          <changed>1502896718</changed>          <gmt_changed>2017-08-16 15:18:38</gmt_changed>      </item>          <item>          <nid>594500</nid>          <type>image</type>          <title><![CDATA[Raheem Beyah in 3-D Printing Lab2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[additive-manufacturing-0293.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/additive-manufacturing-0293.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/additive-manufacturing-0293.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/additive-manufacturing-0293.jpg?itok=Vl5_e4F5]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Raheem Beyah in 3-D printing lab]]></image_alt>                    <created>1502896693</created>          <gmt_created>2017-08-16 15:18:13</gmt_created>          <changed>1502896733</changed>          <gmt_changed>2017-08-16 15:18:53</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="149"><![CDATA[Nanotechnology and Nanoscience]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="149"><![CDATA[Nanotechnology and Nanoscience]]></term>      </news_terms>  <keywords>          <keyword tid="175204"><![CDATA[additive]]></keyword>          <keyword tid="57171"><![CDATA[additive manufacturing]]></keyword>          <keyword tid="173033"><![CDATA[3-D printing]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="215"><![CDATA[manufacturing]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39471"><![CDATA[Materials]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="434941">  <title><![CDATA[Students Spend Summer Launching Startups]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Shiv Patel thought he invented a solution to a problem plaguing roommates. His original idea would help people split expenses on everything from pizza delivery to vacation homes.</p><p>Patel is one of the teams picked for this year&rsquo;s Startup Summer, a 12-week internship for Georgia Tech students and recent graduates who want to launch startups based on their own inventions and prototypes. The program teaches students to understand potential customers and the market so they can build a product or service that addresses a real and quantified need.</p><p>That approach showed Patel the faults in his idea. For it to work, he would need the ability to issue instant, virtual pre-paid debit cards.&nbsp;This would require the&nbsp;infrastructure&nbsp;and support of a bank,&nbsp;but most said the concept was too futuristic or too costly to set up.</p><p>He put aside his original concept and instead created <a href="https://mercez.com">Mercez</a>, a tool to help people when they&rsquo;re travelling and shopping abroad. The company&rsquo;s first product, TrueCost, helps people avoid foreign transaction fees, unfavorable exchange rates and miscellaneous fees by providing daily updates showing which of their credit cards provides the best deal on any given day.</p><p>&ldquo;I have motivation, but Startup Summer gives me the support and structure and honest advice I need,&rdquo; said Patel, a computer science major. &ldquo;Instead of letting me be discouraged when my first idea didn&rsquo;t work, they helped me ask the questions I needed to find something else.&rdquo;</p><p>That entrepreneurial confidence to try and try again is what Georgia Tech wants to instill in students, said Raghupathy Sivakumar, the Wayne J. Holman Chair in the School of Electrical and Computer Engineering and a Startup Summer instructor.</p><p>The confidence comes from the methodical steps students take in the program. They incorporate companies, perform customer discovery, build product iterations, determine pricing strategies, gain customer traction, take the product to market and deal with founder equity allocations.</p><p>Startup Summer is part of CREATE-X, a newly launched initiative to enhance and support entrepreneurship programs for undergraduate students.</p><p>Georgia Tech alumnus Christopher W. Klaus provided significant funding for CREATE-X, and eight of the 10 Startup Summer teams accepted an investment from the fund. While 13 teams were accepted this year, three shut down operations after realizing there was not a market for their idea.</p><p>Alumni and industry veterans served as mentors for the teams.</p><p>&ldquo;The networking has been unbelievable,&rdquo; said Josh Lieberman, one of the founders of <a href="http://www.teqcharging.com">TEQ Charging</a>. &ldquo;So many in the Georgia Tech alumni network are offering their support and advice.&rdquo;</p><p>TEQ created a power strip to charge electric vehicles. The technology and design increases the efficiency &ndash; and lowers the cost &ndash; of current charge stations by sequentially charging vehicles, said Isaac Wittenstein, another co-founder. Installing this plug-in system throughout parking lots or decks allows drivers to charge when they need it.</p><p>Lieberman and Wittenstein, both mechanical engineering majors, ventured into the electric vehicle market during Startup Lab, a course within the CREATE-X program taught by Sivakumar, that exposes students to startups and teaches them how to develop a business model. They teamed up with the third TEQ co-founder, Dorrier Coleman, who worked on electric vehicles during Capstone Design. He graduated in May.</p><p>TEQ recently earned second place in Atlan10, which ranked the most innovative young startups in Atlanta.</p><p>Another team, <a href="http://www.replantable.com">Replantable</a>, is selling one of its products at Sevananda Natural Foods Mart in Atlanta&rsquo;s Little Five Points.</p><p>The team created a soilless growing system using LED lights, which eliminates the need for direct exposure to sunlight. The system circulates water and has minerals making it possible for people to grow up to five pounds of fruits and vegetables a week, said Alex Weiss, one of the co-founders. The NanoFarm stands about 5-feet tall and takes up about as much space as a dining room chair.</p><p>Weiss and Ruwan Subasinghe graduated from Tech in May and have been friends since freshman orientation in 2011.</p><p>At Sevananda they&rsquo;re selling seedling pods that can be screwed onto one-gallon water jugs so people can start growing their own food. The NanoFarm should be available for purchase later this fall.</p><p>Until then, Replantable and the other nine teams will show off their startups at Demo Day, taking place at 5 p.m. Tuesday at the Historic Academy of Medicine.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1439806890</created>  <gmt_created>2015-08-17 10:21:30</gmt_created>  <changed>1502385469</changed>  <gmt_changed>2017-08-10 17:17:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Startup Summer is part of CREATE-X, a newly launched initiative to enhance and support entrepreneurship programs for undergraduate students.]]></teaser>  <type>news</type>  <sentence><![CDATA[Startup Summer is part of CREATE-X, a newly launched initiative to enhance and support entrepreneurship programs for undergraduate students.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2015-08-17T00:00:00-04:00</dateline>  <iso_dateline>2015-08-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-08-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Georgia Tech Media Relations<br />404-894-6016</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>584003</item>          <item>434611</item>          <item>434591</item>      </media>  <hg_media>          <item>          <nid>584003</nid>          <type>image</type>          <title><![CDATA[CREATE-X logo - updated]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CreateX-solid-1line-black+124-tag.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/CreateX-solid-1line-black%2B124-tag.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CreateX-solid-1line-black%2B124-tag.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/CreateX-solid-1line-black%252B124-tag.png?itok=OuqHrpD2]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[CREATE-X Entrepreneurial Confidence]]></image_alt>                    <created>1479405515</created>          <gmt_created>2016-11-17 17:58:35</gmt_created>          <changed>1504035420</changed>          <gmt_changed>2017-08-29 19:37:00</gmt_changed>      </item>          <item>          <nid>434611</nid>          <type>image</type>          <title><![CDATA[Mercez]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[managecardsdifferentcurrencies.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/managecardsdifferentcurrencies_1.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/managecardsdifferentcurrencies_1.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/managecardsdifferentcurrencies_1.png?itok=b_ejvKrB]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Mercez]]></image_alt>                    <created>1449256148</created>          <gmt_created>2015-12-04 19:09:08</gmt_created>          <changed>1475895174</changed>          <gmt_changed>2016-10-08 02:52:54</gmt_changed>      </item>          <item>          <nid>434591</nid>          <type>image</type>          <title><![CDATA[TEQ Charging]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[final_render.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/final_render_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/final_render_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/final_render_0.png?itok=qlHlaH1r]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[TEQ Charging]]></image_alt>                    <created>1449256148</created>          <gmt_created>2015-12-04 19:09:08</gmt_created>          <changed>1475895174</changed>          <gmt_changed>2016-10-08 02:52:54</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://create-x.gatech.edu]]></url>        <title><![CDATA[CREATE-X]]></title>      </link>          <link>        <url><![CDATA[http://startupsummer.gatech.edu/]]></url>        <title><![CDATA[Startup Summer at Georgia Tech]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="137161"><![CDATA[CREATE-X]]></keyword>          <keyword tid="3472"><![CDATA[entrepreneurship]]></keyword>          <keyword tid="166972"><![CDATA[startup summer]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="592724">  <title><![CDATA[Kimberly-Clark Joins Georgia Tech’s Internet-of-Things Research Center]]></title>  <uid>28797</uid>  <body><![CDATA[<p>Kimberly-Clark has joined Georgia Tech&rsquo;s Center for the Development and Application of Internet-of-Things Technologies (CDAIT). As a member of this global, non-profit research and development center with a seat on the Executive Advisory Board, Kimberly-Clark will help guide research into the rapidly evolving Internet-of-Things (IoT) marketplace that addresses critical societal issues including privacy, trust, ethics, regulation and policy.</p><p>This follows the announcement by Kimberly-Clark Professional about Onvation Technology, a smart restroom management system that harnesses the machine-to-machine connectivity of IoT to provide customers with up-to-the-minute monitoring of restroom conditions from any device or location, 24 hours a day. Onvation Technology is a patent-protected system that delivers real-time data and alerts so building managers can identify and fix restroom problems before they become complaints.</p><p>&ldquo;Onvation Technology is Kimberly-Clark&rsquo;s first foray into the IoT world,&rdquo; explains Renee Pearson, global director of IT Innovation. &ldquo;By joining CDAIT, we are taking an active role in shaping the future of IoT innovation and better understanding how to continue leveraging the convergence of the physical and digital worlds to bring actionable data, analytics and insights to businesses.&rdquo;</p><p>Kimberly-Clark is building on its long-standing partnership with Georgia Tech, dating back more than 35 years. The two organizations have partnered together from a research perspective, and Kimberly-Clark sponsors key programs within the institution including Women in Engineering, the Renewable Bioproducts Institute, the Center for Bio-Inspired Design, and the Institute for Electronics and Nanotechnology. Kimberly-Clark employs more than 100 Georgia Tech alumni.</p><p>&ldquo;We are looking forward to actively collaborating with Kimberly-Clark&rsquo;s experts in the IoT space,&rdquo; says Alain Louchez, managing director of CDAIT. &quot;In particular, their significant involvement in the IoT Security and Privacy Working Group will provide a very useful perspective in a complex and critical area.&rdquo; Currently, CDAIT&rsquo;s activities are focused on horizontal domains through six Working Groups, i.e., education and training; startup ecosystem; thought leadership, security and privacy; standards and management; and research.</p><p>&nbsp;&ldquo;Kimberly-Clark has a strong track record of transforming insights and technologies into innovative products and services that improve the lives of nearly a quarter of the world&rsquo;s population,&rdquo; says Clay Mahaffey, global R&amp;D director for Kimberly-Clark Professional. &ldquo;By partnering closely with our fellow CDAIT board members and Georgia Tech&rsquo;s faculty and students, we aim to build on this history of innovation and explore the many dimensions of IoT and their applicability in today&rsquo;s world.&rdquo;</p><p>&ldquo;We are honored to welcome Kimberly-Clark to our board,&rdquo; says Jeff Evans, chair of the CDAIT Executive Advisory Board and director of the Information and Communications Laboratory at the Georgia Tech Research Institute. &ldquo;With their experience and expertise, we&rsquo;ll keep pushing IoT research and insights even further.&rdquo;</p><p><strong>About Kimberly-Clark</strong><br />Kimberly-Clark (NYSE: KMB) and its well-known global brands are an indispensable part of life for people in more than 175 countries. Every day, nearly a quarter of the world&#39;s population trust Kimberly-Clark&#39;s brands and the solutions they provide to enhance their health, hygiene and well-being. With brands such as Kleenex, Scott, Huggies, Pull-Ups, Kotex and Depend, Kimberly-Clark holds No. 1 or No. 2 share positions in 80 countries. To keep up with the latest news and to learn more about the company&#39;s 145-year history, visit <a href="http://www.kimberly-clark.com/" target="_blank">www.kimberly-clark.com</a>.</p><p><strong>About CDAIT</strong><br />CDAIT (pronounced &quot;sedate&quot;) is a global, non-profit, partner-funded center within the Georgia Institute of Technology (&ldquo;Georgia Tech&rdquo;) located in Atlanta that fosters interdisciplinary research and education while driving general awareness about the Internet of Things. It aims at efficiently identifying, understanding and solving for its sponsors challenges and problems that may arise along the whole IoT value chain. CDAIT bridges sponsors with Georgia Tech faculty and researchers as well as industry members with similar interests. To learn more about CDAIT, visit <a href="http://www.cdait.gatech.edu/">www.cdait.gatech.edu</a>.&nbsp;</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1497530372</created>  <gmt_created>2017-06-15 12:39:32</gmt_created>  <changed>1497539201</changed>  <gmt_changed>2017-06-15 15:06:41</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Internet-of-Things research at Georgia Tech continues to grow.]]></teaser>  <type>news</type>  <sentence><![CDATA[Internet-of-Things research at Georgia Tech continues to grow.]]></sentence>  <summary><![CDATA[<p>Kimberly-Clark has joined Georgia Tech&rsquo;s Center for the Development and Application of Internet-of-Things Technologies (CDAIT)</p>]]></summary>  <dateline>2017-06-15T00:00:00-04:00</dateline>  <iso_dateline>2017-06-15T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-06-15 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>589095</item>      </media>  <hg_media>          <item>          <nid>589095</nid>          <type>image</type>          <title><![CDATA[Center for the Development and Application of Internet-of-Things Technologies]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CDAIT_Centergy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/CDAIT_Centergy.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CDAIT_Centergy.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/CDAIT_Centergy.jpg?itok=4ukXGebc]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1490191565</created>          <gmt_created>2017-03-22 14:06:05</gmt_created>          <changed>1490191565</changed>          <gmt_changed>2017-03-22 14:06:05</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.cdait.gatech.edu]]></url>        <title><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="173063"><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></keyword>          <keyword tid="79601"><![CDATA[Alain Louchez]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="592107">  <title><![CDATA[Eaton Brings Lighting Expertise to Georgia Tech’s Internet of Things Research Center]]></title>  <uid>28797</uid>  <body><![CDATA[<p>Power management company Eaton today announced it joined the Georgia Institute of Technology&rsquo;s <a href="https://cdait.gatech.edu/">Center for the Development and Application of Internet of Things Technologies</a> (CDAIT), an Atlanta-based research center dedicated to developing and applying Internet of Things (IoT) technologies. As a member company with a lighting division based in the Atlanta area, Eaton can now provide Georgia Tech students and faculty with lighting expertise and hands-on training to help support research that further enables transformational IoT technologies.</p><p>In recent years, the IoT has emerged as a new frontier that promises to reshape how people, data and devices interact. The increasing interconnectivity created by the combination of the internet, mobile devices, embedded sensors, data analytics and cloud computing has opened new avenues for technological innovation.</p><p>&ldquo;IoT systems are laying the groundwork for smart, connected buildings, communities and homes, and lighting is a key factor in the enablement and adoption of these technologies,&rdquo; said Parth Joshi, chief technology officer and vice president, Engineering, Eaton&rsquo;s Lighting Division. &ldquo;Working with the students and faculty at Georgia Tech&rsquo;s CDAIT, we look forward to expanding our research into the many possibilities of IoT-enabled devices while helping find new ways to apply them to serve the needs of businesses, governments and consumers.&rdquo;</p><p>Eaton&rsquo;s CDAIT membership is part of a broader commitment to developing and implementing IoT-connected applications that improve efficiency through controls and data. The new Connected Lighting Classroom at Eaton&rsquo;s <a href="http://thelightingresource.eaton.com/education/source">SOURCE Lighting Education Center</a> near Atlanta features in-depth training and hands-on demonstrations to educate lighting specifiers, architects, engineers, electrical contractors, builders and university students about IoT-connected lighting solutions.</p><p>&ldquo;CDAIT is working to effectively and efficiently unite the many pieces of the IoT puzzle, from sensing and actuating technology to information extraction,&rdquo; said Alain Louchez, managing director of CDAIT. &ldquo;By bringing Eaton&rsquo;s experts together with our students and faculty, we will increase our understanding of the role lighting plays in IoT connectivity while expanding, educating and energizing the market around the unique capabilities of IoT applications.&rdquo;</p><p>A key element in this developing relationship is Eaton&rsquo;s engineering office in Midtown Atlanta, which will enable a direct connection to the Georgia Tech campus and the talented, aspiring engineers driving innovation in lighting.</p><p>&ldquo;We are extremely pleased and honored to welcome a distinguished company such as Eaton to the executive advisory board (&lsquo;the Board&rdquo;) of CDAIT to advise and guide CDAIT&rsquo;s direction,&rdquo; added Jeff Evans, chairman of the CDAIT Board.</p><p>CDAIT (pronounced &quot;sedate&quot;) is a global, non-profit, partner-funded center within the Georgia Institute of Technology located in Atlanta that fosters interdisciplinary research and education while driving general awareness about the Internet of Things. It aims at efficiently identifying, understanding and solving for its sponsors challenges and problems that may arise along the whole IoT value chain. CDAIT connects sponsors with Georgia Tech faculty and researchers as well as industry members with similar interests.</p><p>To learn more about CDAIT, visit&nbsp;<a href="http://www.cdait.gatech.edu">cdait.gatech.edu</a>.</p><p>Eaton delivers a range of innovative and reliable indoor and outdoor lighting solutions, as well as controls products specifically designed to maximize performance, energy efficiency and cost savings. Eaton lighting solutions serve customers in the commercial, industrial, retail, institutional, residential, utility and other markets.</p><p>Eaton&rsquo;s electrical business is a global leader with expertise in power distribution and circuit protection; backup power protection; control and automation; lighting and security; structural solutions and wiring devices; solutions for harsh and hazardous environments; and engineering services. Eaton is positioned through its global solutions to answer today&rsquo;s most critical electrical power management challenges.</p><p>Eaton is a power management company with 2016 sales of $19.7 billion that provides energy-efficient solutions to help consumers manage electrical, hydraulic and mechanical power more efficiently, safely and sustainably. Eaton is dedicated to improving the quality of life and the environment through the use of power management technologies and services. Eaton has approximately 95,000 employees and sells products to customers in more than 175 countries. For more information, visit <a href="http://Eaton.com">Eaton.com</a>, and to learn more about Eaton&rsquo;s lighting solutions, visit <a href="http://www.eaton.com/lighting">eaton.com/lighting</a>.&nbsp;</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1495662147</created>  <gmt_created>2017-05-24 21:42:27</gmt_created>  <changed>1495662573</changed>  <gmt_changed>2017-05-24 21:49:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Power management joins Georgia Tech's Internet of Things research effort.]]></teaser>  <type>news</type>  <sentence><![CDATA[Power management joins Georgia Tech's Internet of Things research effort.]]></sentence>  <summary><![CDATA[<p>Eaton&rsquo;s&nbsp;membership in CDAIT is part of a broader commitment to developing and implementing IoT-connected applications that improve efficiency through controls and data.</p>]]></summary>  <dateline>2017-05-24T00:00:00-04:00</dateline>  <iso_dateline>2017-05-24T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-05-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>589095</item>      </media>  <hg_media>          <item>          <nid>589095</nid>          <type>image</type>          <title><![CDATA[Center for the Development and Application of Internet-of-Things Technologies]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CDAIT_Centergy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/CDAIT_Centergy.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CDAIT_Centergy.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/CDAIT_Centergy.jpg?itok=4ukXGebc]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1490191565</created>          <gmt_created>2017-03-22 14:06:05</gmt_created>          <changed>1490191565</changed>          <gmt_changed>2017-03-22 14:06:05</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://thelightingresource.eaton.com/education/source]]></url>        <title><![CDATA[Eaton's SOURCE Lighting Education Center]]></title>      </link>          <link>        <url><![CDATA[https://cdait.gatech.edu/]]></url>        <title><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></title>      </link>          <link>        <url><![CDATA[http://www.cooperindustries.com/content/public/en/lighting.html?wtredirect=www.eaton.com/lighting]]></url>        <title><![CDATA[Eaton]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="8008"><![CDATA[Eaton]]></keyword>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="173063"><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="591959">  <title><![CDATA[Network Traffic Provides Early Indication of Malware Infection]]></title>  <uid>27303</uid>  <body><![CDATA[<p>By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they&#39;re able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner.</p><p>The strategy would take advantage of the fact that malware invaders need to communicate with their command and control computers, creating network traffic that can be detected and analyzed. Having an earlier warning of developing malware infections could enable quicker responses and potentially reduce the impact of attacks, the study&rsquo;s researchers say.</p><p>&ldquo;Our study shows that by the time you find the malware, it&rsquo;s already too late because the network communications and domain names used by the malware were active weeks or even months before the actual malware was discovered,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/emmanouil-konstantinos-antonakakis">Manos Antonakakis</a>, an assistant professor in the <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. &ldquo;These findings show that we need to fundamentally change the way we think about network defense.&rdquo;</p><p>Traditional defenses depend on the detection of malware in a network. While analyzing malware samples can identify suspicious domains and help attribute network attacks to their sources, relying on samples to drive defensive actions gives malicious actors a critical time advantage to gather information and cause damage. &ldquo;What we need to do is minimize the amount of time between the compromise and the detection event,&rdquo; Antonakakis added.</p><p>The research, which will be presented May 24 at the 38th IEEE Security and Privacy Symposium in San Jose, California, was supported by the U.S. Department of Commerce, the National Science Foundation, the Air Force Research Laboratory and the Defense Advanced Research Projects Agency. The project was done in collaboration with EURECOM in France and the IMDEA Software Institute in Spain &ndash; whose work was supported by the regional government of Madrid and the government of Spain.</p><p>In the study, Antonakakis, Graduate Research Assistant Chaz Lever and colleagues analyzed more than five billion network events from nearly five years of network traffic carried by a major U.S. internet service provider (ISP). They also studied domain name server (DNS) requests made by nearly 27 million malware samples, and examined the timing for the re-registration of expired domains &ndash; which often provide the launch sites for malware attacks.</p><p>&ldquo;There were certain networks that were more prone to abuse, so looking for traffic into those hot spot networks was potentially a good indicator of abuse underway,&rdquo; said Lever, the first author of the paper and a student in Georgia Tech&rsquo;s School of Electrical and Computer Engineering. &ldquo;If you see a lot of DNS requests pointing to hot spots of abuse, that should raise concerns about potential infections.&rdquo;</p><p>The researchers also found that requests for dynamic DNS also related to bad activity, as these often correlate with services used by bad actors because they provide free domain registrations and the ability to add quickly add domains.</p><p>The researchers had hoped that the registration of previously expired domain names might provide a warning of impending attacks. But Lever found there was often a lag of months between when expired domains were re-registered and attacks from them began.&nbsp;</p><p>The research required development of a filtering system to separate benign network traffic from malicious traffic in the ISP data. The researchers also conducted what they believe is the largest malware classification effort to date to differentiate the malicious software from potentially unwanted programs (PUPs). To study similarities, they assigned the malware to specific &ldquo;families.&rdquo;</p><p>By studying malware-related network traffic seen by the ISPs prior to detection of the malware, the researchers were able to determine that malware signals were present weeks and even months before new malicious software was found. Relating that to human health, Antonakakis compares the network signals to the fever or general feeling of malaise that often precedes identification of the microorganism responsible for an infection.</p><p>&ldquo;You know you are sick when you have a fever, before you know exactly what&rsquo;s causing it,&rdquo; he said. &ldquo;The first thing the adversary does is set up a presence on the internet, and that first signal can indicate an infection. We should try to observe that symptom first on the network because if we wait to see the malware sample, we are almost certainly allowing a major infection to develop.&rdquo;</p><p>In all, the researchers found more than 300,000 malware domains that were active for at least two weeks before the corresponding malware samples were identified and analyzed.</p><p>But as with human health, detecting a change indicating infection requires knowledge of the baseline activity, he said. Network administrators must have information about normal network traffic so they can detect the abnormalities that may signal a developing attack. While many aspects of an attack can be hidden, malware must always communicate back to those who sent it.</p><p>&ldquo;If you have the ability to detect traffic in a network, regardless of how the malware may have gotten in, the action of communicating through the network will be observable,&rdquo; Antonakais said. &ldquo;Network administrators should minimize the unknowns in their networks and classify their appropriate communications as much as possible so they can see the bad activity when it happens.&rdquo;</p><p>Antonakakis and Lever hope their study will lead to development of new strategies for defending computer networks.</p><p>&ldquo;The choke point is the network traffic, and that&rsquo;s where this battle should be fought,&rdquo; said Antonakakis. &ldquo;This study provides a fundamental observation of how the next generation of defense mechanisms should be designed. As more complicated attacks come into being, we will have to become smarter at detecting them earlier.&rdquo;</p><p>In addition to those already mentioned, the study included Davide Balzarotti from EURECOM, and Platon Kotzias and Juan Caballero from IMDEA Software Institute.</p><p><em>This material is based upon work supported in part by the U.S. Department of Commerce grant 2106DEK, National Science Foundation (NSF) grant 2106DGX and Air Force Research Laboratory/Defense Advanced Research Projects Agency grant 2106DTX. This research was also partially supported by the Regional Government of Madrid through the N-GREENS Software-CM S2013/ICE-2731 project and by the Spanish Government through the DEDETIS grant TIN2015-7013-R. Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the Department of Commerce, National Science Foundation, Air Force Research Laboratory, or Defense Advanced Research Projects Agency.</em></p><p><strong>CITATION</strong>: Chaz Lever, et al., &ldquo;A Lustrum of Malware Network Communication: Evolution and Insights,&rdquo; (38th IEEE Security and Privacy Symposium, 2017). &nbsp;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Josh Brown (404-385-0500) (josh.brown@comm.gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1495386927</created>  <gmt_created>2017-05-21 17:15:27</gmt_created>  <changed>1495461204</changed>  <gmt_changed>2017-05-22 13:53:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Analyzing network traffic going to suspicious domains could give security administrators earlier warning of malware infections.]]></teaser>  <type>news</type>  <sentence><![CDATA[Analyzing network traffic going to suspicious domains could give security administrators earlier warning of malware infections.]]></sentence>  <summary><![CDATA[<p>By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they&#39;re able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner.</p>]]></summary>  <dateline>2017-05-22T00:00:00-04:00</dateline>  <iso_dateline>2017-05-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-05-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>591956</item>          <item>591957</item>          <item>591958</item>      </media>  <hg_media>          <item>          <nid>591956</nid>          <type>image</type>          <title><![CDATA[Domains queried by malware samples]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[malware-sources5740.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/malware-sources5740.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/malware-sources5740.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/malware-sources5740.jpg?itok=g3o8nBmL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chart showing sources of malware]]></image_alt>                    <created>1495385945</created>          <gmt_created>2017-05-21 16:59:05</gmt_created>          <changed>1495385945</changed>          <gmt_changed>2017-05-21 16:59:05</gmt_changed>      </item>          <item>          <nid>591957</nid>          <type>image</type>          <title><![CDATA[Time difference between network traces and blacklisting]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[detection-difference5774.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/detection-difference5774.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/detection-difference5774.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/detection-difference5774.jpg?itok=lkUPirIv]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Difference between network traces and blacklisting]]></image_alt>                    <created>1495386157</created>          <gmt_created>2017-05-21 17:02:37</gmt_created>          <changed>1495386157</changed>          <gmt_changed>2017-05-21 17:02:37</gmt_changed>      </item>          <item>          <nid>591958</nid>          <type>image</type>          <title><![CDATA[Tracing malware network traffic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cybersecurity2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cybersecurity2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cybersecurity2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cybersecurity2.jpg?itok=oFOai7qd]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Network cables plugged into servers]]></image_alt>                    <created>1495386324</created>          <gmt_created>2017-05-21 17:05:24</gmt_created>          <changed>1495386324</changed>          <gmt_changed>2017-05-21 17:05:24</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="174479"><![CDATA[malware attack]]></keyword>          <keyword tid="174477"><![CDATA[domain]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="1385"><![CDATA[network]]></keyword>          <keyword tid="174476"><![CDATA[network traffic]]></keyword>          <keyword tid="173795"><![CDATA[Manos Antonakakis]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="1108"><![CDATA[detection]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="591964">  <title><![CDATA[Combination of Features Produces New Android Vulnerability]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. The combination could result in a new class of attacks, which has been dubbed &ldquo;Cloak and Dagger.&rdquo;</p><p>The vulnerability, which was identified and tested in closed environments by computer scientists at the Georgia Institute of Technology, would allow attackers to silently take control of a mobile device, overlaying the graphical interface with false information to hide malicious activities being performed underneath &ndash; such as capturing passwords or extracting the user&rsquo;s contacts. A successful attack would require the user to first install a type of malware that could be hidden in a pirated game or other app.</p><p>Georgia Tech researchers have disclosed the potential attack to Google, maker of the Android system, and details of the vulnerability will be presented May 24 at the 38th IEEE Symposium on Security and Privacy in San Jose, California. But because it involves two common features that can be misused even when they behave as intended, the issue could be more difficult to resolve than ordinary operating system bugs.</p><p>&ldquo;In Cloak and Dagger, we identified two different Android features that when combined, allow an attacker to read, change or capture the data entered into popular mobile apps,&rdquo; said <a href="http://www.scs.gatech.edu/people/11062/wenke-lees">Wenke Lee</a>, a professor in Georgia Tech&rsquo;s <a href="http://www.scs.gatech.edu/">School of Computer Science</a> and co-director of the <a href="http://www.iisp.gatech.edu/">Institute for Information Security &amp; Privacy</a>. &ldquo;The two features involved are very useful in mapping, chat or password manager apps, so preventing their misuse will require users to trade convenience for security. This is as dangerous an attack as we could possibly describe.&rdquo;</p><p>The research was sponsored by the National Science Foundation (NSF), Office of Naval Research (ONR) and the Defense Advanced Research Projects Agency (DARPA).</p><p>The first permission feature involved in the attack, known as &ldquo;BIND_ACCESSIBILITY_SERVICE,&rdquo; supports the use of devices by disabled persons, allowing inputs such as user name and password to be made by voice command, and allowing outputs such as a screen reader to help the disabled view content. The second permission, known as &ldquo;SYSTEM_ALERT_WINDOW,&rdquo; is an overlay or &ldquo;draw on top&rdquo; feature that produces a window on top of the device&rsquo;s usual screen to display bubbles for a chat program or maps for a ride-sharing app.</p><p>When combined in a malicious way, &ldquo;SYSTEM_ALERT_WINDOW&rdquo; acts as a cloak, while &ldquo;BIND_ACCESSIBILITY_SERVICE&rdquo; serves as the dagger. The two could allow attackers to draw a window that fools users into believing they are interacting with legitimate features of the app. The malicious program, operating as the overlay, would then capture the user&rsquo;s credentials for the malware author, while the accessibility permission would enter the credentials into the real app hidden beneath, allowing it to operate as expected, leaving the user with no clue that anything is awry.</p><p>The researchers tested a simulated attack on 20 users of Android mobile devices and found that none of them noticed the attack.</p><p>Of most concern to Georgia Tech&rsquo;s researchers is that these permissions may be automatically included in legitimate apps from the Google Play store, meaning users do not need to explicitly grant permissions for the attack to succeed.&nbsp;</p><p>&ldquo;This is a design flaw that some might say allows the app functionality to work as intended, but our research shows that it can be misused,&rdquo; said Yanick Fratantonio, the paper&rsquo;s first author and a Georgia Tech Ph.D. summer intern from the University of California Santa Barbara. &ldquo;Once the phone is compromised, there may be no way for the user to understand what has happened.&rdquo;</p><p>Nearly 10 percent of the top 5,000 Android apps use the overlay feature, noted Fratantonio, and many are downloaded with the accessibility feature enabled.&nbsp;</p><p>While both permissions have been used separately as user-interface redressing attacks and &ldquo;a11y attacks,&rdquo; previous research did not examine what happens when they are combined, noted Simon P. Chung, a research scientist at Georgia Tech&rsquo;s School of Computer Science and one of the study&rsquo;s co-authors.</p><p>Creating vulnerabilities when permissions are combined may be a reality that system developers will have to consider more seriously in the future, Fratantonio said. &ldquo;Changing a feature is not like fixing a bug,&rdquo; he explained. &ldquo;System designers will now have to think more about how seemingly unrelated features could interact. Features do not operate separately on the device.&rdquo;</p><p>Android versions up to and including the current 7.1.2 are vulnerable to this attack. The researchers caution that it may be difficult to determine the status of the settings required for the attack.</p><p>There are two key precautions, Lee and Fratantonio agree. One is to avoid downloading apps from providers other than branded outlets such as the Google Play store. A second step is to check the permission requests that apps make before allowing them to operate.</p><p>&ldquo;Users need to be careful about the permissions that new apps request,&rdquo; said Lee. &ldquo;If there are very broad permissions, or the permissions don&rsquo;t seem to match what the app is promising to do, you need to be sure you really need that app.&rdquo;</p><p>The researchers have produced a video that shows the attack and how to check these permissions, which are in different locations depending on the mobile operating system version.</p><p>&ldquo;Apps from name-brand sources such as Facebook, Uber and Skype should be okay,&rdquo; said Lee. &ldquo;But with a random game or free versions of paid apps that you might download, you should be very careful. These features are very powerful and can be abused to do anything you could do as a user &ndash; without you knowing.&rdquo;</p><p>In addition to the researchers already mentioned, the project also included Chenxiong Qian from Georgia Tech.&nbsp;</p><p><em>This research was supported by the NSF awards CNS-1017265, CNS-0831300, CNS-1149051 and DGE-1500084, by the ONR under grants N000140911042 and N000141512162, and by the DARPA Transparent Computing program under contract DARPA-15-15-TC-FP-006. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF, ONR or DARPA.</em></p><p><strong>CITATION</strong>: Yanick Fratantonio, et al., &ldquo;Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop,&rdquo; (38th IEEE Symposium on Security and Privacy, 2017).</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Josh Brown (404-385-0500) (josh.brown@comm.gatech.edu)</p><p><strong>Writer</strong>: John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1495388437</created>  <gmt_created>2017-05-21 17:40:37</gmt_created>  <changed>1495451481</changed>  <gmt_changed>2017-05-22 11:11:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. ]]></teaser>  <type>news</type>  <sentence><![CDATA[A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. ]]></sentence>  <summary><![CDATA[<p>A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. The combination could result in a new class of attacks, which has been dubbed &ldquo;Cloak and Dagger.&rdquo;</p>]]></summary>  <dateline>2017-05-22T00:00:00-04:00</dateline>  <iso_dateline>2017-05-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-05-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>591960</item>          <item>591962</item>          <item>591961</item>      </media>  <hg_media>          <item>          <nid>591960</nid>          <type>image</type>          <title><![CDATA[Using an Android mobile device]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Android Security-3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Android%20Security-3.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Android%20Security-3.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Android%2520Security-3.jpg?itok=9sQI9PrJ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Using an Android device]]></image_alt>                    <created>1495387470</created>          <gmt_created>2017-05-21 17:24:30</gmt_created>          <changed>1495387470</changed>          <gmt_changed>2017-05-21 17:24:30</gmt_changed>      </item>          <item>          <nid>591962</nid>          <type>image</type>          <title><![CDATA[Checking permission on Android device]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Android Security-2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Android%20Security-2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Android%20Security-2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Android%2520Security-2.jpg?itok=HWp_j1Ct]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Checking permissions on Android device]]></image_alt>                    <created>1495387687</created>          <gmt_created>2017-05-21 17:28:07</gmt_created>          <changed>1495387687</changed>          <gmt_changed>2017-05-21 17:28:07</gmt_changed>      </item>          <item>          <nid>591961</nid>          <type>image</type>          <title><![CDATA[Using an Android mobile device2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[android-security-1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/android-security-1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/android-security-1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/android-security-1.jpg?itok=8HUxOUZr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Using an Android mobile device]]></image_alt>                    <created>1495387557</created>          <gmt_created>2017-05-21 17:25:57</gmt_created>          <changed>1495387557</changed>          <gmt_changed>2017-05-21 17:25:57</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="43261"><![CDATA[android]]></keyword>          <keyword tid="174480"><![CDATA[permissions]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="173634"><![CDATA[vulnerability]]></keyword>          <keyword tid="174481"><![CDATA[Cloak and Dagger]]></keyword>          <keyword tid="10893"><![CDATA[wenke lee]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="591176">  <title><![CDATA[A Bipartisan Approach to Cyber]]></title>  <uid>27918</uid>  <body><![CDATA[<p>As the threat of cyberattacks continues to grow, government officials are asking what can individuals and businesses do to protect themselves.</p><p>&ldquo;We are starting this conversation of when it is time to go on the offensive as it relates to cybersecurity,&rdquo; said Rep. Tom Graves (R-Ga 14). &ldquo;This creates a lot of policy, ethics and privacy questions.&rdquo;</p><p>Graves and Rep. Kyrsten Sinema (D-Ariz. 9) heard some answers to those questions during a panel discussion they held at Georgia Tech Monday. The bipartisan event examined how public policy can help people and companies go on the offense to defeat and unmask cyber attackers.</p><p>In March, Graves put forth a <a href="http://tomgraves.house.gov/news/documentsingle.aspx?DocumentID=398726">discussion draft of a bill</a> to allow the use of limited defensive measures to identify and stop attackers. While cyber policy discussions are taking place in Washington, Graves said they wanted to hear from others.</p><p>&ldquo;Quite frankly we&rsquo;re not satisfied with the direction of where policy has gone as it relates to cybersecurity,&rdquo; he said.</p><p>Monday&rsquo;s panel allowed for a robust discussion on cybersecurity from a policy perspective, an academic perspective and the private sector perspective.</p><p>In addition to Graves and Sinema, the other panelists were:</p><ul><li>John Lens, a vice president for the Network and Security Business Unit at VMware.</li><li>Stephen Pair, co-founder and CEO of BitPay.</li><li>Peter Swire, the Huang Professor of Law and Ethics in the Scheller College of Business.</li><li>Candace Worley, chief technical strategist for McAfee.</li></ul><p>Georgia Tech is a place &ldquo;where government, industry and universities can come together to talk about some very, very challenging problems in the world,&rdquo; said Stephen E. Cross, the Institute&rsquo;s executive vice president for research.</p><p>The Institute has been developing cybersecurity solutions for more than 20 years. Tech&nbsp;houses nearly a dozen labs and centers dedicated to cybersecurity, and has more than 450 scientists, faculty and students involved with this research.</p><p>Georgia Tech is also home to the <a href="http://atdc.org">Advanced Technology Development Center</a> (ATDC), the state&#39;s technology incubator. ATDC is currently incubating seven companies in the cybersecurity space and assisting 33 entrepreneurs and early-stage startups&nbsp;statewide with entrepreneurial education in cybersecurity.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1493668102</created>  <gmt_created>2017-05-01 19:48:22</gmt_created>  <changed>1493668502</changed>  <gmt_changed>2017-05-01 19:55:02</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Rep. Tom Graves, Rep. Kyrsten Sinema hold panel discussion at Georgia Tech to talk about cybersecurity policy and technical challenges.]]></teaser>  <type>news</type>  <sentence><![CDATA[Rep. Tom Graves, Rep. Kyrsten Sinema hold panel discussion at Georgia Tech to talk about cybersecurity policy and technical challenges.]]></sentence>  <summary><![CDATA[<p>Rep. Tom Graves (R-Ga 14) and&nbsp;Rep. Kyrsten Sinema (D-Ariz. 9) hold a panel discussion at Georgia Tech to talk about cybersecurity policy and technical challenges.&nbsp;The bipartisan event examined how public policy can help people and companies go on the offense to defeat and unmask cyber attackers.&nbsp;</p>]]></summary>  <dateline>2017-05-01T00:00:00-04:00</dateline>  <iso_dateline>2017-05-01T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-05-01 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>591172</item>          <item>591174</item>          <item>590939</item>      </media>  <hg_media>          <item>          <nid>591172</nid>          <type>image</type>          <title><![CDATA[Cyber MayDay at Georgia Tech]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CyberMayDay.jpeg.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/CyberMayDay.jpeg.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CyberMayDay.jpeg.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/CyberMayDay.jpeg.png?itok=HwSfyNir]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1493667347</created>          <gmt_created>2017-05-01 19:35:47</gmt_created>          <changed>1493667446</changed>          <gmt_changed>2017-05-01 19:37:26</gmt_changed>      </item>          <item>          <nid>591174</nid>          <type>image</type>          <title><![CDATA[Cyber MayDay Welcome]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CyberMayDayCross.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/images/CyberMayDayCross.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CyberMayDayCross.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/CyberMayDayCross.JPG?itok=RBbYbGq_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1493667435</created>          <gmt_created>2017-05-01 19:37:15</gmt_created>          <changed>1493667435</changed>          <gmt_changed>2017-05-01 19:37:15</gmt_changed>      </item>          <item>          <nid>590939</nid>          <type>image</type>          <title><![CDATA[Cyber MayDay]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[iStock-629285904_1024x540_w_chevron_01.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/iStock-629285904_1024x540_w_chevron_01.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iStock-629285904_1024x540_w_chevron_01.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/iStock-629285904_1024x540_w_chevron_01.jpg?itok=h1HqxL55]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1493152789</created>          <gmt_created>2017-04-25 20:39:49</gmt_created>          <changed>1493152807</changed>          <gmt_changed>2017-04-25 20:40:07</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://iisp.gatech.edu]]></url>        <title><![CDATA[Georgia Tech’s Institute for Information Security & Privacy]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="132"><![CDATA[Institute Leadership]]></category>          <category tid="133"><![CDATA[Special Events and Guest Speakers]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="132"><![CDATA[Institute Leadership]]></term>          <term tid="133"><![CDATA[Special Events and Guest Speakers]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="145981"><![CDATA[IISP]]></keyword>          <keyword tid="141341"><![CDATA[Institute for Information Security &amp; Privacy]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="590772">  <title><![CDATA[Autism and Computing]]></title>  <uid>27948</uid>  <body><![CDATA[<p>Across Georgia Tech, researchers, faculty members, and students from every discipline are devoted to finding the causes of and effective treatments for autism.</p><p>Each week in April, we will publish more stories about&nbsp;our autism-related work.</p><h5>WEEK ONE: <a href="http://www.news.gatech.edu/features/bringing-autism-spectrum-focus#computing">Autism and Computing</a></h5>]]></body>  <author>Jennifer Tomasino</author>  <status>1</status>  <created>1492799785</created>  <gmt_created>2017-04-21 18:36:25</gmt_created>  <changed>1492799785</changed>  <gmt_changed>2017-04-21 18:36:25</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Autism research in computing runs the gamut from helping clinicians diagnose and manage the disorder to informing research in artificial intelligence.]]></teaser>  <type>news</type>  <sentence><![CDATA[Autism research in computing runs the gamut from helping clinicians diagnose and manage the disorder to informing research in artificial intelligence.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2017-04-11T00:00:00-04:00</dateline>  <iso_dateline>2017-04-11T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-04-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[mterraza@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Michael Terrazas</strong><br />Director&nbsp;of Communications<br />Georgia Tech College of Computing<br />(o) 404.385.7225<br />(c) 404.245.0707<br /><a href="applewebdata://A80EC028-FDBD-44C4-9FC4-15608E385584/cc.gatech.edu">www.cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>590771</item>      </media>  <hg_media>          <item>          <nid>590771</nid>          <type>image</type>          <title><![CDATA[Autism and Computing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[autism-computing-mercury-thumb.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/autism-computing-mercury-thumb.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/autism-computing-mercury-thumb.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/autism-computing-mercury-thumb.jpg?itok=RICFxemj]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Autism and Computing]]></image_alt>                    <created>1492799749</created>          <gmt_created>2017-04-21 18:35:49</gmt_created>          <changed>1492799749</changed>          <gmt_changed>2017-04-21 18:35:49</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1300"><![CDATA[Institute Communications]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="6053"><![CDATA[Autism]]></keyword>          <keyword tid="208"><![CDATA[computing]]></keyword>          <keyword tid="667"><![CDATA[robotics]]></keyword>      </keywords>  <core_research_areas>          <term tid="39521"><![CDATA[Robotics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="590698">  <title><![CDATA[Siemens Opens Innovation Center in Tech Square]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Representatives from Siemens opened its Data Analytics and Applications Center in Georgia Tech&rsquo;s Technology Square on Thursday, making it the latest global corporation to open an innovation center on or near campus.</p><p>The <a href="http://news.usa.siemens.biz/press-release/mobility/siemens-launches-new-business-digitalize-us-rail-industry">center</a> will help transportation providers use big data to improve operations and safety. For example, the Siemens team will work with the City of Atlanta to collect information from the Atlanta Streetcar and analyze data points to make the best use of the fleet.</p><p>Siemens is the 16<sup>th</sup> company to open an <a href="http://www.gatech.edu/innovation-ecosystem/innovation-centers-and-accelerators">innovation center in Tech Square</a>. These centers represent a diverse range of industries with a common goal of tapping into the innovation neighborhood&rsquo;s vibrant network of students, faculty, researchers and startup entrepreneurs.</p><p>The Data Analytics and Applications Center represents an exciting next step in the longstanding relationship between Georgia Tech and Siemens, said Stephen E. Cross, the Institute&rsquo;s executive vice president for research.</p><p>&ldquo;Siemens has been a longtime partner of the Institute, and we are proud that they are now a part of the vision for Tech Square and the strategy that drives Georgia Tech as an institution,&rdquo; Cross said. &ldquo;Georgia Tech plays a strategic role in growing Georgia&rsquo;s entrepreneurial ecosystem and continues to forge paths to new research and innovation that have impact on our city, state, and region. Nowhere is that more evident than in Tech Square and nowhere is it is better realized than in centers like the Siemens Data Analytics and Applications Center.&rdquo;</p><p>Here are some examples of the extensive collaboration between the Institute and Siemens:</p><ul><li>Georgia Tech has partnered on more than 20 projects with Siemens over the past four years in manufacturing, health care and energy.</li><li>For more than 15 years, the Siemens Foundation has collaborated with the Center for Education Integrating Science, Mathematics and Computing (CEISMC). Activities include improving K-12 science and math education in underserved communities; hosting the Siemens Competition in Math, Science and Technology; and preparing students for the future of manufacturing.</li><li>Siemens also recruits about 30 Georgia Tech students each year, primarily through 15 technical training programs that lead to direct hire upon completion.</li></ul>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1492700773</created>  <gmt_created>2017-04-20 15:06:13</gmt_created>  <changed>1492707852</changed>  <gmt_changed>2017-04-20 17:04:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The German conglomerate is the 16th company to open an innovation center at Georgia Tech. ]]></teaser>  <type>news</type>  <sentence><![CDATA[The German conglomerate is the 16th company to open an innovation center at Georgia Tech. ]]></sentence>  <summary><![CDATA[<p>The German conglomerate is opening its Data Analytics and Applications Center. Siemens is the 16<sup>th</sup> company to open an innovation center at Georgia Tech.&nbsp;</p>]]></summary>  <dateline>2017-04-20T00:00:00-04:00</dateline>  <iso_dateline>2017-04-20T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-04-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>For media inquiries about the innovation centers in Georgia Tech&rsquo;s Tech Square please contact Laura Diamond, <a href="mailto:laura.diamond@gatech.edu">laura.diamond@gatech.edu</a></p><p>For other information about the innovation centers, please contact Greg King, <a href="mailto:greg.king@gatech.edu">greg.king@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>537831</item>          <item>590700</item>      </media>  <hg_media>          <item>          <nid>537831</nid>          <type>image</type>          <title><![CDATA[Tech Square]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[technology-square.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/technology-square.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/technology-square.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/technology-square.jpeg?itok=ERx_ofKe]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1464282000</created>          <gmt_created>2016-05-26 17:00:00</gmt_created>          <changed>1520359284</changed>          <gmt_changed>2018-03-06 18:01:24</gmt_changed>      </item>          <item>          <nid>590700</nid>          <type>image</type>          <title><![CDATA[Siemens Data Analytics and Applications Center ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Introduction.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Introduction.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Introduction.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Introduction.jpg?itok=0Djb19q8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1492700966</created>          <gmt_created>2017-04-20 15:09:26</gmt_created>          <changed>1492707912</changed>          <gmt_changed>2017-04-20 17:05:12</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.gatech.edu/innovation-ecosystem/innovation-centers-and-accelerators]]></url>        <title><![CDATA[Innovation Centers at Georgia Tech]]></title>      </link>          <link>        <url><![CDATA[http://news.usa.siemens.biz/press-release/mobility/siemens-launches-new-business-digitalize-us-rail-industry]]></url>        <title><![CDATA[Siemens News Release]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="170298"><![CDATA[Innovation Centers]]></keyword>          <keyword tid="77221"><![CDATA[innovation ecosystem]]></keyword>          <keyword tid="2002"><![CDATA[Tech Square]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="589089">  <title><![CDATA[Honeywell Joins Georgia Tech Internet-of-Things Research Center]]></title>  <uid>28797</uid>  <body><![CDATA[<p>Honeywell today announced that it is joining Georgia Tech&rsquo;s Center for the Development and Application of Internet of Things Technologies (CDAIT), reinforcing its commitment to grow its Atlanta presence. This follows Honeywell&rsquo;s announcement late last year that it would create more than 730 software engineering jobs at its new U.S. Software Center and establish a global headquarters for its $10.7 billion Home and Building Technology business in Midtown Atlanta.</p><p>As a global Fortune 100 technology leader in the industrial, commercial and consumer space, Honeywell will bring software engineering expertise to CDAIT along with broader experience and exposure to the emerging and rapidly growing Internet of Things (IoT) marketplace.</p><p>&ldquo;Honeywell is developing some of the world&rsquo;s most advanced software and digital-based services and solutions to enable customers to realize the full potential of the IoT,&rdquo; said Stephen Gold, Vice President and General Manager of Honeywell Connected Enterprises.&nbsp; &ldquo;Building on over a century of industry experience, our data scientists and developers create value by connecting the physical and digital worlds to deliver better outcomes and a safer, smarter, more sustainable experience. Software engineers at Honeywell work on real problems that impact people&rsquo;s lives every day, whether at home, at work, in a plant, in your car, or on an airplane.&nbsp; We&rsquo;re excited to be working with Georgia Tech&rsquo;s CDAIT on new IoT applications.&nbsp; Together, we can accomplish a lot.&rdquo;</p><p>By joining CDAIT, Honeywell is building on its existing collaboration with Georgia Tech and the rich resource that its faculty, students and research facilities represent.&nbsp; Honeywell is working to aggressively recruit top software engineering talent to its new Atlanta-based U.S. Software Center.&nbsp; These engineers will specialize in developing software solutions that support Honeywell&rsquo;s offerings, which address the emergence of IoT, including mobile, cloud computing and data analytics, as well as marketing and user experience. Honeywell engineers will work on critical software and digital products as part of the company&rsquo;s connected technologies focus in homes, buildings, industrial plants, workers, automobiles and aircraft.</p><p>&ldquo;We are looking forward to working closely with Honeywell&rsquo;s team to leverage their IoT-related capabilities,&rdquo; said Alain Louchez, Managing Director of CDAIT. &ldquo;Our goal is to quickly advance our relationship to respond to the growing demands and opportunities in the IoT space. The proximity to the Georgia Tech campus of Honeywell&rsquo;s new Atlanta home will facilitate terrific exchanges and cooperation.&rdquo;</p><p>At CDAIT, Honeywell looks to enhance its understanding of the many dimensions and challenges of the IoT space through collaborative research and activities with its fellow board members and Georgia Tech faculty and students.</p><p>&rdquo;We are delighted to welcome Honeywell to CDAIT&rsquo;s board,&rdquo; said Jeff Evans, chairman of the CDAIT board and director of the Information and Communications Laboratory at the Georgia Tech Research Institute, which houses CDAIT. &ldquo;The collective knowledge and talent in technological and business domains Honeywell brings effectively complement the skill set and experience of our board.&rdquo;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><strong>About Honeywell</strong></p><p>Honeywell (<a href="http://www.honeywell.com/" target="_blank">www.honeywell.com</a>) is a Fortune 100 software-industrial company that delivers industry specific solutions that include aerospace and automotive products and services; control technologies for buildings, homes, and industry; and performance materials globally.&nbsp; Our technologies help everything from aircraft, cars, homes and buildings, manufacturing plants, supply chains, and workers become more connected to make our world smarter, safer, and more sustainable.&nbsp; For more news and information on Honeywell, please visit <a href="http://www.honeywell.com/newsroom" target="_blank">www.honeywell.com/newsroom</a>.</p><p><strong>About CDAIT </strong></p><p>CDAIT (pronounced &quot;sedate&quot;) is a global, non-profit, partner-funded center within the Georgia Institute of Technology (&ldquo;Georgia Tech&rdquo;) located in Atlanta that fosters interdisciplinary research and education while driving general awareness about the Internet of Things. It aims at efficiently identifying, understanding and solving for its sponsors challenges and problems that may arise along the whole IoT value chain. CDAIT bridges sponsors with Georgia Tech faculty and researchers as well as industry members with similar interests. To learn more about CDAIT, visit <a href="http://www.cdait.gatech.edu">www.cdait.gatech.edu</a>.&nbsp;</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1490132454</created>  <gmt_created>2017-03-21 21:40:54</gmt_created>  <changed>1490191598</changed>  <gmt_changed>2017-03-22 14:06:38</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Honeywell becomes the 19th company to join Georgia Tech's Internet-of-Things research center]]></teaser>  <type>news</type>  <sentence><![CDATA[Honeywell becomes the 19th company to join Georgia Tech's Internet-of-Things research center]]></sentence>  <summary><![CDATA[<p>Honeywell expands its presence in Atlanta by joining Georgia Tech&#39;s Internet of Things research center, CDAIT.</p>]]></summary>  <dateline>2017-03-21T00:00:00-04:00</dateline>  <iso_dateline>2017-03-21T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-03-21 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>589095</item>      </media>  <hg_media>          <item>          <nid>589095</nid>          <type>image</type>          <title><![CDATA[Center for the Development and Application of Internet-of-Things Technologies]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CDAIT_Centergy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/CDAIT_Centergy.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CDAIT_Centergy.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/CDAIT_Centergy.jpg?itok=4ukXGebc]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1490191565</created>          <gmt_created>2017-03-22 14:06:05</gmt_created>          <changed>1490191565</changed>          <gmt_changed>2017-03-22 14:06:05</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.honeywell.com/newsroom/news/2016/09/honeywell-to-establish-software-center-headquarters]]></url>        <title><![CDATA[Honeywell's announcement of new software center]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1276"><![CDATA[Georgia Tech Research Institute (GTRI)]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="69599"><![CDATA[IPaT]]></group>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="2438"><![CDATA[honeywell]]></keyword>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="64421"><![CDATA[Internet-of-Things]]></keyword>          <keyword tid="173063"><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="588852">  <title><![CDATA[CauteryGuard Wins the InVenture Prize]]></title>  <uid>27918</uid>  <body><![CDATA[<p>A safer medical device used to remove unwanted tissue and to stop bleeding won Georgia Tech&rsquo;s InVenture Prize Wednesday night.</p><p>The four biomedical engineering students behind <a href="http://www.news.gatech.edu/2017/03/13/improved-tool-keep-patients-doctors-safe">CauteryGuard</a> redesigned an electrocautery device by adding a retractable tip. This change prevents the risk of burns many doctors and patients face from the device&rsquo;s exposed tip. It also eliminates the chance of fires in operating rooms because an exposed tip could come into contact with flammable materials.</p><p>The team won $20,000 plus a free patent filing and a spot in Flashpoint, a Georgia Tech accelerator. They also won the $5,000 People&rsquo;s Choice Award, which went to the fans&rsquo; favorite invention.</p><p>&ldquo;This is really incredible,&rdquo; said Dev Mandavia, a student in Georgia Tech&rsquo;s Wallace H. Coulter Department of Biomedical Engineering. &ldquo;This validates all the hard work we&rsquo;ve put into this device. This will allow us to take it to the next step and bring our product to FDA approval and then eventually start saving the lives of patients and surgeons.&rdquo;</p><p>The other team members are: Jack Corelli, Hunter Hatcher and Devin Li.</p><p>The two-member team of&nbsp;InternBlitz earned second&nbsp;place, which comes with&nbsp;$10,000, a free patent filing and a spot in Flashpoint.</p><p><a href="http://www.news.gatech.edu/2017/03/14/easier-way-apply-internships">InternBlitz</a> streamlines the internship application process. It finds internships for students, automatically fills in their personal contact information and resume, and then sends applicants the extra, company-specific questions.</p><p>The inventors are: Murtaza Bambot, an industrial engineering major, and Nathan Dass, a computer science major.</p><p>The annual InVenture Prize brings together student innovators from all academic backgrounds across campus in an effort to foster creativity, invention and entrepreneurship.</p><p>CauteryGuard will now represent Georgia Tech at the <a href="http://accinventureprize.com">ACC InVenture Prize</a>. This competition, which will involve student startups and inventions from each of the 15 universities in the Atlantic Coast Conference, will take place at Georgia Tech March 30 and 31.</p><p>&ldquo;We are so excited to represent Georgia Tech,&rdquo; Mandavia said. &ldquo;Just seeing the support we&rsquo;ve received from everyone, especially everyone in the Coulter Department of Biomedical Engineering,&nbsp;has been incredible.&quot;</p><p>Learn about the other four finalists here:</p><p><a href="http://www.news.gatech.edu/2017/03/13/creating-safer-cane">Capable Cane </a>is a walking cane that unfolds into a portable, full-sized comfortable seat.</p><p><a href="http://www.news.gatech.edu/2017/03/14/how-do-you-perform-cpr-device-will-teach-you">CPR+</a> is a CPR mask that allows an untrained bystander to perform CPR by walking the user through each step of the process.</p><p><a href="http://www.news.gatech.edu/2017/03/14/better-bars-eliminate-barriers-physical-therapy-children">Gaitway</a> are transportable, collapsible parallel bars for physical therapists to use when working with children.</p><p><a href="http://www.news.gatech.edu/2017/03/14/bringing-augmented-reality-warehouses">PickAR</a> uses augmented reality technology so warehouses can process orders more efficiently.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1489667900</created>  <gmt_created>2017-03-16 12:38:20</gmt_created>  <changed>1489677132</changed>  <gmt_changed>2017-03-16 15:12:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[InternBlitz took home second place, while CauteryGuard also scored the People’s Choice Award. ]]></teaser>  <type>news</type>  <sentence><![CDATA[InternBlitz took home second place, while CauteryGuard also scored the People’s Choice Award. ]]></sentence>  <summary><![CDATA[<p>A safer medical device used to remove unwanted tissue and to stop bleeding won Georgia Tech&rsquo;s InVenture Prize Wednesday&nbsp;night. CauteryGuard&nbsp;won $20,000 plus a free patent filing and a spot in Flashpoint, a Georgia Tech accelerator. They also won the $5,000 People&rsquo;s Choice Award, which went to the fans&rsquo; favorite invention.</p><p>&nbsp;</p>]]></summary>  <dateline>2017-03-16T00:00:00-04:00</dateline>  <iso_dateline>2017-03-16T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-03-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>588846</item>          <item>588848</item>      </media>  <hg_media>          <item>          <nid>588846</nid>          <type>image</type>          <title><![CDATA[2017 Inventure Prize Winners]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[C7AE2dXWkAEyee1.jpg_large.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/C7AE2dXWkAEyee1.jpg_large.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/C7AE2dXWkAEyee1.jpg_large.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/C7AE2dXWkAEyee1.jpg_large.jpg?itok=nvDQGbR_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Team Cautery Guard takes home the grand prize of the 2017 InVenture Prize.]]></image_alt>                    <created>1489629719</created>          <gmt_created>2017-03-16 02:01:59</gmt_created>          <changed>1489630439</changed>          <gmt_changed>2017-03-16 02:13:59</gmt_changed>      </item>          <item>          <nid>588848</nid>          <type>image</type>          <title><![CDATA[CauteryGuard ]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[InventureMediaDay-012.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/InventureMediaDay-012.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/InventureMediaDay-012.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/InventureMediaDay-012.jpg?itok=JIVaslnH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Students invented a safer tool for cauterizations during surgeries. ]]></image_alt>                    <created>1489630604</created>          <gmt_created>2017-03-16 02:16:44</gmt_created>          <changed>1489630604</changed>          <gmt_changed>2017-03-16 02:16:44</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://inventureprize.gatech.edu]]></url>        <title><![CDATA[Georgia Tech's InVenture Prize]]></title>      </link>          <link>        <url><![CDATA[https://www.dropbox.com/sh/xo779h8irspton7/AACHUlLxhiTWAyZWb2vxATlQa?dl=0]]></url>        <title><![CDATA[Photos from the InVenture Prize Finale]]></title>      </link>          <link>        <url><![CDATA[http://accinventureprize.com]]></url>        <title><![CDATA[ACC InVenture Prize]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="169753"><![CDATA[student startups]]></keyword>          <keyword tid="89111"><![CDATA[entrepeneurship]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="588788">  <title><![CDATA[Who Will Win the 2017 InVenture Prize?]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Six teams of inventors will learn tonight which of them will win the 2017 InVenture Prize.</p><p>The annual Georgia Tech competition brings together student innovators to foster creativity, invention and entrepreneurship.</p><p>The finale begins at 7:30 p.m. in the Ferst Center for the Arts. It will&nbsp;air live on GPB and can be <a href="http://www.gpb.org/inventure">watched online here</a>.</p><p>Meet the finalists:</p><ul><li><a href="http://www.news.gatech.edu/2017/03/13/creating-safer-cane">Capable Cane</a> is a walking cane that unfolds into a portable, full-sized comfortable seat.</li><li><a href="http://www.news.gatech.edu/2017/03/13/improved-tool-keep-patients-doctors-safe">CauteryGuard</a> is a safer electrocautery device, which is used by medical personnel to remove unwanted tissue and to stop bleeding.</li><li><a href="http://www.news.gatech.edu/2017/03/14/how-do-you-perform-cpr-device-will-teach-you">CPR+</a> is a CPR mask that allows an untrained bystander to perform CPR by walking the user through each step of the process.</li><li><a href="http://www.news.gatech.edu/2017/03/14/better-bars-eliminate-barriers-physical-therapy-children">Gaitway</a> are transportable, collapsible parallel bars for physical therapists to use when working with children.</li><li><a href="http://www.news.gatech.edu/2017/03/14/easier-way-apply-internships">InternBlitz</a> takes the digital college application system of the Common App and applies it to internships.</li><li><a href="http://www.news.gatech.edu/2017/03/14/bringing-augmented-reality-warehouses">PickAR</a> uses augmented reality technology so warehouses can process orders more efficiently.</li></ul><p>The winning team earns $20,000 and represents Georgia Tech in the annual ACC InVenture Prize, taking place on campus March 31.</p><p>The second-place team gets $10,000.</p><p>Both first- and second-place finishers will receive free U.S. patent filings.</p><p>A $5,000 People&rsquo;s Choice Award will go to the fans&rsquo; favorite invention. Voting will be held online and by text messaging during the finale.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1489582352</created>  <gmt_created>2017-03-15 12:52:32</gmt_created>  <changed>1489583659</changed>  <gmt_changed>2017-03-15 13:14:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Winners will be announced tonight. Six teams competing for $35,000 in cash prizes.]]></teaser>  <type>news</type>  <sentence><![CDATA[Winners will be announced tonight. Six teams competing for $35,000 in cash prizes.]]></sentence>  <summary><![CDATA[<p>The annual InVenture Prize competition brings together student innovators to foster creativity, invention and entrepreneurship.&nbsp;The finale begins at 7:30 p.m. in the Ferst Center for the Arts. It will&nbsp;air live on GPB.&nbsp;</p>]]></summary>  <dateline>2017-03-15T00:00:00-04:00</dateline>  <iso_dateline>2017-03-15T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-03-15 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>113971</item>          <item>47390</item>      </media>  <hg_media>          <item>          <nid>113971</nid>          <type>image</type>          <title><![CDATA[Inventure Prize Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[inventure_logo.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/inventure_logo_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/inventure_logo_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/inventure_logo_0.jpg?itok=L3TfsTNq]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Inventure Prize Logo]]></image_alt>                    <created>1449178226</created>          <gmt_created>2015-12-03 21:30:26</gmt_created>          <changed>1475894733</changed>          <gmt_changed>2016-10-08 02:45:33</gmt_changed>      </item>          <item>          <nid>47390</nid>          <type>image</type>          <title><![CDATA[InVenture Prize Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[tne92353.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/tne92353.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tne92353.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/tne92353.jpg?itok=WhhIn_5z]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[InVenture Prize Logo]]></image_alt>                    <created>1449175107</created>          <gmt_created>2015-12-03 20:38:27</gmt_created>          <changed>1475894442</changed>          <gmt_changed>2016-10-08 02:40:42</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://inventureprize.gatech.edu]]></url>        <title><![CDATA[Georgia Tech's InVenture Prize]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="169753"><![CDATA[student startups]]></keyword>          <keyword tid="3472"><![CDATA[entrepreneurship]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="588781">  <title><![CDATA[Bringing Augmented Reality to Warehouses ]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Sarthak Srinivas visited a warehouse a few months ago and worked a shift as a picker. It was his job to get a bunch of items scattered throughout the warehouse and bring them to one location.</p><p>After a few hours of manipulating a heavy cart and carrying a tablet and a barcode scanning gun, his back and legs began to hurt. He also had trouble finding his way around the large, unfamiliar warehouse.</p><p>Shortly after his warehouse visit, Srinivas, a computer science major at Georgia Tech, entered a hackathon with two other computer science majors. The three do research in augmented reality and wondered how the technology could be used in an everyday setting.</p><p>They applied their research to the inefficiencies at warehouses and created PickAR, a headset that uses augmented reality technology to overlay picking information so warehouses can find and process orders more efficiently.</p><p>The invention is one of six competing for the 2017 Georgia Tech InVenture Prize. The annual competition awards $35,000 in cash prizes and brings together student innovators from all academic backgrounds to foster creativity, invention and entrepreneurship.</p><p>&ldquo;Warehouses have three main problems and PickAR can solve them all really well,&rdquo; explained Srinivas, who is from Bangalore, India.</p><p>The device integrates with existing warehouse management systems so the pickers always have the most relevant information available. The team also built the barcode scanner into the headset, eliminating the need to carry additional equipment.</p><p>And they included a navigation system that takes advantage of the headset&rsquo;s tracking capabilities to map out where to go in the warehouse. The device calculates which package is closest and where it is located and provides this information in the top left corner of the headset. Then the headset maps out the shortest path, using green arrows to lead the way.</p><p>Order picking constitutes up to 60 percent of the operational costs for warehouses, said Cheng Hann Gan, who is from Wheaton, Ill. And since about 80 percent of order picking in warehouses is manual any improvement will allow companies to save money, he added. &nbsp;</p><p>The team envisions the technology being used in warehouses run by large companies such as Amazon and Wal-Mart. But they said it could also benefit large government archives and libraries as well.</p><p>&ldquo;As computer science majors we knew we could create these solutions and design it in a way for everyone to use,&rdquo; said Wenqi Xian, who is from Beijing.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1489527092</created>  <gmt_created>2017-03-14 21:31:32</gmt_created>  <changed>1489582513</changed>  <gmt_changed>2017-03-15 12:55:13</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[PickAR uses augmented reality so warehouses can process orders more efficiently.]]></teaser>  <type>news</type>  <sentence><![CDATA[PickAR uses augmented reality so warehouses can process orders more efficiently.]]></sentence>  <summary><![CDATA[<p>PickAR&nbsp;includes a headset that uses augmented reality technology to overlay picking information so warehouses can find and process orders more efficiently&nbsp;The invention is one of six competing for the 2017 Georgia Tech InVenture Prize. The winner will be announced Wednesday night.</p>]]></summary>  <dateline>2017-03-14T00:00:00-04:00</dateline>  <iso_dateline>2017-03-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-03-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[<p>The winning InVenture Prize team will take home $20,000 and represent Georgia Tech in the annual ACC InVenture Prize, taking place on campus much March 31.</p><p>The second-place team earns $10,000.</p><p>Both first- and second-place finishers will receive free U.S. patent filings by Georgia Tech&rsquo;s Office of Technology Licensing and a spot in Georgia Tech&rsquo;s startup accelerator program, Flashpoint.</p><p>A $5,000 People&rsquo;s Choice Award will go to the fans&rsquo; favorite invention. Voting will be held online and by text messaging during the finale.</p>]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>588632</item>          <item>588632</item>          <item>113971</item>      </media>  <hg_media>          <item>          <nid>588632</nid>          <type>image</type>          <title><![CDATA[Oculogx]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[InventureMediaDay-016.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/InventureMediaDay-016.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/InventureMediaDay-016.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/InventureMediaDay-016.jpg?itok=e93BI0RX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1489419806</created>          <gmt_created>2017-03-13 15:43:26</gmt_created>          <changed>1506446659</changed>          <gmt_changed>2017-09-26 17:24:19</gmt_changed>      </item>          <item>          <nid>113971</nid>          <type>image</type>          <title><![CDATA[Inventure Prize Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[inventure_logo.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/inventure_logo_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/inventure_logo_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/inventure_logo_0.jpg?itok=L3TfsTNq]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Inventure Prize Logo]]></image_alt>                    <created>1449178226</created>          <gmt_created>2015-12-03 21:30:26</gmt_created>          <changed>1475894733</changed>          <gmt_changed>2016-10-08 02:45:33</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://inventureprize.gatech.edu]]></url>        <title><![CDATA[Georgia Tech's InVenture Prize]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="7764"><![CDATA[InVenture Prize]]></keyword>          <keyword tid="169753"><![CDATA[student startups]]></keyword>          <keyword tid="208"><![CDATA[computing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="588780">  <title><![CDATA[An Easier Way to Apply for Internships]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Last year Murtaza Bambot applied to 125 different companies for internships. He spent about 70 hours filling out applications, and much of it was repetitious &ndash; providing his contact information and uploading his resume over and over again.</p><p>&ldquo;I realized if I was having this problem, so were thousands of other college students across the country,&rdquo; said Bambot, an industrial engineering major from Duluth, Ga.</p><p>He teamed up with Nathan Dass, a computer science major, and together they invented a computer program to streamline the internship application process.&nbsp;</p><p>InternBlitz finds internships for students, automatically fills in their personal contact information and resume, and then sends applicants the extra, company-specific questions. It is similar to the online Common App students use to apply for colleges. If InternBlitz had existed last year, Bambot estimates he could have applied for all 125 internships in just one hour.</p><p>The invention is one of six competing for the 2017 Georgia Tech InVenture Prize. The annual competition awards $35,000 in cash prizes and brings together student innovators from all academic backgrounds to foster creativity, invention and entrepreneurship.</p><p>Bambot and Dass, who are members of Alpha Kappa Psi, started working on the invention in October.</p><p>&ldquo;Writing the script for the program wasn&rsquo;t hard,&rdquo; said Dass, who is from Woodbridge, Va. &ldquo;The biggest challenge was getting a high number of good internship jobs so students would want to use our site.&rdquo;</p><p>They pulled applications from different servers and have about 600 openings on the site now. The number is expected to more than double in the fall, during the height of internship application season, the team said.</p><p>The site is going through beta testing with roughly 100 students from Georgia Tech and Georgia State University. The service is free for students.</p><p>&ldquo;We don&rsquo;t want money to be a barrier for jobs,&rdquo; Bambot said. &ldquo;All college students should have easy and free access to good internships.&rdquo;</p><p>Once they have enough students go through the application process they plan to use machine learning to analyze how far applicants got with each internship.</p><p>The data could reveal to both students and companies what type of applicant profile is most likely to be selected for a first-round interview. This in turn could allow the internship process to become more efficient for both students and companies, they said.</p><p>&ldquo;We&rsquo;ll be able to make internship recommendations the same way Netflix gives movie recommendations,&rdquo; Dass said.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1489526675</created>  <gmt_created>2017-03-14 21:24:35</gmt_created>  <changed>1489581271</changed>  <gmt_changed>2017-03-15 12:34:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[InternBlitz streamlines the internship application process. The invention is up for the InVenture Prize.]]></teaser>  <type>news</type>  <sentence><![CDATA[InternBlitz streamlines the internship application process. The invention is up for the InVenture Prize.]]></sentence>  <summary><![CDATA[<p>InternBlitz finds internships for students, automatically fills in their personal contact information and resume, and then sends applicants the extra, company-specific questions.&nbsp;The invention is one of six competing for the 2017 Georgia Tech InVenture Prize. The winner will be announced Wednesday night.</p>]]></summary>  <dateline>2017-03-14T00:00:00-04:00</dateline>  <iso_dateline>2017-03-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2017-03-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[<p>The winning InVenture Prize team will take home $20,000 and represent Georgia Tech in the annual ACC InVenture Prize, taking place on campus March 31.</p><p>The second-place team earns $10,000.</p><p>Both first- and second-place finishers will receive free U.S. patent filings.</p><p>A $5,000 People&rsquo;s Choice Award will go to the fans&rsquo; favorite invention. Voting will be held online and by text messaging during the finale.</p>]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>588640</item>          <item>47353</item>          <item>588422</item>      </media>  <hg_media>          <item>          <nid>588640</nid>          <type>image</type>          <title><![CDATA[InternBlitz]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[InventureMediaDay-014.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/InventureMediaDay-014.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/InventureMediaDay-014.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/InventureMediaDay-014.jpg?itok=MNPwZsg_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1489423480</created>          <gmt_created>2017-03-13 16:44:40</gmt_created>          <changed>1489423480</changed>          <gmt_changed>2017-03-13 16:44:40</gmt_changed>      </item>          <item>          <nid>47353</nid>          <type>image</type>          <title><![CDATA[InVenture Prize Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[tne92353.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/tne92353_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tne92353_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/tne92353_1.jpg?itok=RYjAEpdV]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[InVenture Prize Logo]]></image_alt>                    <created>1449175107</created>          <gmt_created>2015-12-03 20:38:27</gmt_created>          <changed>1475894442</changed>          <gmt_changed>2016-10-08 02:40:42</gmt_changed>      </item>          <item>          <nid>588422</nid>          <type>image</type>          <title><![CDATA[InternBlitz Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[InternBlitz.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/InternBlitz.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/InternBlitz.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/InternBlitz.png?itok=YMk6tOQ4]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[InternBlitz Logo]]></image_alt>                    <created>1488920036</created>          <gmt_created>2017-03-07 20:53:56</gmt_created>          <changed>1488920036</changed>          <gmt_changed>2017-03-07 20:53:56</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://inventureprize.gatech.edu]]></url>        <title><![CDATA[Georgia Tech's InVenture Prize]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="7764"><![CDATA[InVenture Prize]]></keyword>          <keyword tid="3472"><![CDATA[entrepreneurship]]></keyword>          <keyword tid="169753"><![CDATA[student startups]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="588139">  <title><![CDATA[Chiral Metamaterial Produces Record Optical Shift Under Incremental Power Modulation]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Georgia Institute of Technology researchers have demonstrated an optical metamaterial whose chiroptical properties in the nonlinear regime produce a significant spectral shift with power levels in the milliwatt range.&nbsp;</p><p>The researchers recently demonstrated properties of their chiral metamaterial, in which they spectrally modified two absorptive resonances by incrementally exposing the material to power intensities beyond its linear optical regime. With a 15 milliwatt change in excitation power, they measured a 10-nanometer spectral shift in the material&rsquo;s transmission resonances and a 14-degree polarization rotation.&nbsp;</p><p>The researchers believe that may be the strongest nonlinear optical rotation ever reported for a chiral metamaterial, and is about a hundred thousand times larger than the current record measurement for this type of structure. The research, supported by the National Science Foundation and the Air Force Research Laboratory, was reported February 27 in the journal <em>Nature Communications</em>.&nbsp;</p><p>&ldquo;Nanoscale chiral structures offer an approach to modulating optical signals with relatively small variations in input power,&rdquo; said Sean Rodrigues, a Ph.D. candidate who led the research in the laboratory of Associate Professor <a href="https://www.ece.gatech.edu/faculty-staff-directory/wenshan-cai">Wenshan Cai</a> in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>. &ldquo;To see this kind of change in such a thin material makes chiroptical metamaterials an interesting new platform for optical signal modulation.&rdquo;</p><p>This modulation of chiroptical responses from metamaterials by manipulating input power offers the potential for new types of active optics such as all-optical switching and light modulation. The technologies could have applications in such areas as data processing, sensing and communications.</p><p>Chiral materials exhibit optical properties that differ depending on their opposing circular polarizations. The differences between these responses, which are created by the nanoscale patterning of absorptive materials, can be utilized to create large chiroptical resonances. To be useful in applications such as all-optical switching, these resonances would need to be induced by external tuning &ndash; such as variations in power input.</p><p>&ldquo;When you increase the power, you shift the spectrum,&rdquo; Rodrigues said. &ldquo;In effect, you change the transmission at certain wavelengths, meaning you&rsquo;re changing the amount of light passing through the sample by simply modifying input power.&rdquo; For optical engineers, that could be the basis for a switch.</p><p>The material demonstrated by Cai&rsquo;s lab are made by nano-patterning layers of silver &ndash; approximately 33 nanometers thick &ndash; onto glass substrates. Between the carefully-designed silver layers is a 45-nanometer layer of dielectric material. An elliptical pattern is created using electron beam lithography, then the entire structure is encapsulated within a dielectric material to prevent oxidation.</p><p>&ldquo;It is the engineering of these structures that gives us these chiral optical properties,&rdquo; Rodrigues explained. &ldquo;The goal is really to take advantage of the discrepancy between one circular polarization versus the other to create the broadband resonances we need.&rdquo;</p><p>The material operates in the visible to near-infrared spectrum, at approximately 740 to 1,000 nanometers. The optical rotation and circular dichroism measurements were taken with the beam entering the material at a normal incident angle.</p><p>The researchers induced the change in circular dichroism by increasing the optical power applied to the material from 0.5 milliwatts up to 15 milliwatts. While that is comparatively low power for a laser system, it has a high enough energy flux (energy transfer in time) to instigate change.</p><p>&ldquo;The beam size is roughly 40 microns, so it is really focused,&rdquo; said Rodrigues. &ldquo;We are putting a lot of energy into a small area, which causes the effect to be fairly intense.&rdquo;<br />The researchers don&rsquo;t yet know what prompts the change, but suspect that thermal processes may be involved in altering the material&rsquo;s properties to boost the circular dichroism. Tests show that the power applications do not damage the metamaterial.</p><p>Cai&rsquo;s laboratory has been studying chiral materials of different kinds for a variety of optical applications. In June 2015, they <a href="http://www.rh.gatech.edu/news/415011/theory-turns-reality-nonlinear-optical-metamaterials">reported the realization</a> of one of the long-standing theoretical predictions in nonlinear optical metamaterials: creation of a nonlinear material that has opposite refractive indices at the fundamental and harmonic frequencies of light. Such a material, which doesn&rsquo;t exist naturally, had been predicted for nearly a decade.</p><p>In addition to those already mentioned, the research included Shoufeng Lan, Lei Kang, Yonghao Cui, Patrick Panuski, Shengxiang Wang and Augustine M. Urbas. Urbas is associated with the Air Force Research Laboratory at Wright-Patterson Air Force Base; Wang is associated with Wuhan Textile University in China. The others are associated with Georgia Tech.&nbsp;</p><p><em>This work was performed in part at the Georgia Tech Institute for Electronics and Nanotechnology, a member of the National Nanotechnology Coordinated Infrastructure, which is supported by the National Science Foundation (Grant ECCS-1542174). This material is based on work partially supported by the National Science Foundation under Grant No. ECCS-1609567 and by collaborative support from the Air Force Research Laboratory through UES and Azimuth subcontracts S-977-022-001 and 238-5404-GIT, respectively. Support is also acknowledged from the National Science Foundation (NSF) Graduate Research Fellowship under Grant No. DGE-1650044. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsoring organizations.</em></p><p><strong>CITATION</strong>: Rodrigues, S.P. et al., &ldquo;Intensity-dependent modulation of optically active signals in a chiral metamaterial,&rdquo; (Nature Communications, 2017). <a href="http://dx.doi.org/10.1038/ncomms14602">http://dx.doi.org/10.1038/ncomms14602</a>.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (404-385-1933) (ben.brumfield@comm.gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1488380385</created>  <gmt_created>2017-03-01 14:59:45</gmt_created>  <changed>1488380606</changed>  <gmt_changed>2017-03-01 15:03:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have demonstrated an optical metamaterial whose chiroptical properties in the nonlinear regime produce a significant spectral shift.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have demonstrated an optical metamaterial whose chiroptical properties in the nonlinear regime produce a significant spectral shift.]]></sentence>  <summary><![CDATA[<p>Georgia Institute of Technology researchers have demonstrated an optical metamaterial whose chiroptical properties in the nonlinear regime produce a significant spectral shift with power levels in the milliwatt range.&nbsp;</p>]]></summary>  <dateline>2017-03-01T00:00:00-05:00</dateline>  <iso_dateline>2017-03-01T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-03-01 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>588134</item>          <item>588136</item>          <item>588137</item>      </media>  <hg_media>          <item>          <nid>588134</nid>          <type>image</type>          <title><![CDATA[Studying chiral metamaterials]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[chiral-metamaterial3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/chiral-metamaterial3.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/chiral-metamaterial3.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/chiral-metamaterial3.jpg?itok=BHyo0EqG]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Studying chiral metamaterial]]></image_alt>                    <created>1488379641</created>          <gmt_created>2017-03-01 14:47:21</gmt_created>          <changed>1488379641</changed>          <gmt_changed>2017-03-01 14:47:21</gmt_changed>      </item>          <item>          <nid>588136</nid>          <type>image</type>          <title><![CDATA[Nanopatterned chiral metamaterial]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[chiral-metamaterial1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/chiral-metamaterial1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/chiral-metamaterial1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/chiral-metamaterial1.jpg?itok=A9hP1Y5G]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Nanopatterned chiral metamaterial]]></image_alt>                    <created>1488379759</created>          <gmt_created>2017-03-01 14:49:19</gmt_created>          <changed>1488379759</changed>          <gmt_changed>2017-03-01 14:49:19</gmt_changed>      </item>          <item>          <nid>588137</nid>          <type>image</type>          <title><![CDATA[Equipment for studying chiral metamaterials]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[chiral-metamaterial4.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/chiral-metamaterial4.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/chiral-metamaterial4.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/chiral-metamaterial4.jpg?itok=9Cq3NfPp]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Equipment for studying chiral metamaterials]]></image_alt>                    <created>1488379877</created>          <gmt_created>2017-03-01 14:51:17</gmt_created>          <changed>1488379877</changed>          <gmt_changed>2017-03-01 14:51:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="173626"><![CDATA[chiral]]></keyword>          <keyword tid="128991"><![CDATA[metamaterial]]></keyword>          <keyword tid="173627"><![CDATA[chiral metamaterial]]></keyword>          <keyword tid="2768"><![CDATA[optics]]></keyword>          <keyword tid="91661"><![CDATA[Wenshan Cai]]></keyword>          <keyword tid="173630"><![CDATA[chiroptical]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39471"><![CDATA[Materials]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="587624">  <title><![CDATA[Fast Company Names Georgia Tech to List of Most Innovative Companies in Education]]></title>  <uid>28797</uid>  <body><![CDATA[<p>Fast Company magazine named the Georgia Institute of Technology to its annual &ldquo;World&rsquo;s Most Innovative Companies&rdquo; list in the education sector.</p><p>&ldquo;We are a top-ranked institution, but we are absolutely not the typical staid high-ranked educational institution,&rdquo; said Georgia Tech Provost Rafael Bras, who holds sthe K. Harrison Brown Family Chair. &ldquo;Just as we innovate in research, we do so in education. We take risks and explore new ideas &mdash; that&rsquo;s what innovation is all about.&rdquo;</p><p>Citing Georgia Tech&rsquo;s Online Master of Science&nbsp;in Computer Science (OMSCS) degree, Fast Company ranked Georgia Tech number three, just behind Microsoft and Duolingo. Georgia Tech is the only university listed in the education sector.</p><p>&ldquo;We&rsquo;re honored to be included in this list for offering a high-quality, online graduate degree in computing available at a fraction of the typical cost, thus making higher education both more affordable and more accessible to a much wider audience,&rdquo; said Zvi Galil, the John P. Imlay Jr. Dean of Computing and professor. &ldquo;Georgia Tech&rsquo;s motto is &#39;Progress and Service,&#39; and the College of Computing simply followed those wise words in creating OMSCS.&rdquo;</p><p>Georgia Tech announced in January it was launching a similar online master&rsquo;s program in analytics in August.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1487604265</created>  <gmt_created>2017-02-20 15:24:25</gmt_created>  <changed>1487605546</changed>  <gmt_changed>2017-02-20 15:45:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Fast Company magazine named the Georgia Institute of Technology to its annual “World’s Most Innovative Companies” list in the education sector.]]></teaser>  <type>news</type>  <sentence><![CDATA[Fast Company magazine named the Georgia Institute of Technology to its annual “World’s Most Innovative Companies” list in the education sector.]]></sentence>  <summary><![CDATA[<p>Citing Georgia Tech&rsquo;s online Master&rsquo;s Degree in Computer Science (OMSCS), Fast Company ranked Georgia Tech number three for innovation in the education sector.</p>]]></summary>  <dateline>2017-02-20T00:00:00-05:00</dateline>  <iso_dateline>2017-02-20T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-02-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>370171</item>          <item>587625</item>      </media>  <hg_media>          <item>          <nid>370171</nid>          <type>image</type>          <title><![CDATA[Tech Tower]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[15c6001-p6-001.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/15c6001-p6-001.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/15c6001-p6-001.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/15c6001-p6-001.jpg?itok=X8Vr0M8g]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tech Tower]]></image_alt>                    <created>1449245856</created>          <gmt_created>2015-12-04 16:17:36</gmt_created>          <changed>1475894344</changed>          <gmt_changed>2016-10-08 02:39:04</gmt_changed>      </item>          <item>          <nid>587625</nid>          <type>image</type>          <title><![CDATA[Fast Company World's Most Innovative Companies List]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Screen Shot 2017-02-20 at 10.16.23 AM.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Screen%20Shot%202017-02-20%20at%2010.16.23%20AM.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Screen%20Shot%202017-02-20%20at%2010.16.23%20AM.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Screen%2520Shot%25202017-02-20%2520at%252010.16.23%2520AM.png?itok=22oscfv9]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1487604924</created>          <gmt_created>2017-02-20 15:35:24</gmt_created>          <changed>1487604924</changed>          <gmt_changed>2017-02-20 15:35:24</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.fastcompany.com/company/georgia-institute-of-technology]]></url>        <title><![CDATA[Fast Company story]]></title>      </link>          <link>        <url><![CDATA[https://hypepotamus.com/news/georgia-tech-fast-company/]]></url>        <title><![CDATA[Hypepotamus story]]></title>      </link>          <link>        <url><![CDATA[https://pe.gatech.edu/online-masters-degrees/online-master-science-analytics]]></url>        <title><![CDATA[OMS in Analytics degree]]></title>      </link>          <link>        <url><![CDATA[https://www.omscs.gatech.edu/]]></url>        <title><![CDATA[OMS in Computer Science]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="11979"><![CDATA[Fast Company]]></keyword>          <keyword tid="173521"><![CDATA[most innovative]]></keyword>          <keyword tid="121521"><![CDATA[OMSCS]]></keyword>          <keyword tid="173522"><![CDATA[Zvi Galili]]></keyword>          <keyword tid="10243"><![CDATA[rafael bras]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="587384">  <title><![CDATA[Finalists Selected for the 2017 InVenture Prize ]]></title>  <uid>27918</uid>  <body><![CDATA[<p>The six teams competing for Georgia Tech&rsquo;s 2017 InVenture Prize have invented devices that aim to make our lives safer or more efficient.</p><p>The annual competition brings together student innovators from all academic backgrounds to foster creativity, invention and entrepreneurship.</p><p>More than 500 students applied for the contest, which will select a winner March 15.</p><p>Here are the finalists:</p><p><strong>Capable Cane</strong> is a walking cane that unfolds into a portable, full-sized comfortable seat. The design offers the stability of four legs and provides an armrest and a backrest, making it safer than what is currently available.</p><p>Inventor: Jeffrey McMichael, a mechanical engineering major from Atlanta.</p><p><strong>CauteryGuard</strong> is a safer electrocautery device, which is used by doctors, veterinarians and other medical personnel to remove unwanted tissue and to stop bleeding. The CauteryGaurd automatically retracts when not in use, and the inventors said this removes any chance of accidental injury caused by the device during procedures.&nbsp;</p><p>Inventors: Four biomedical engineering majors &ndash; Jack Corelli from Philadelphia; Hunter Hatcher from Marietta, Ga.; Devin Li from Corning, N.Y.; and Dev Mandavia, from Duluth, Ga.</p><p><strong>CPR+</strong> is a CPR mask that allows an untrained bystander to perform CPR by collecting vitals and dynamically walking the user through each step of the process.</p><p>Inventors: Samuel Clarke, a mechanical engineering and computer science major from Indianapolis; David Ehrlich, a computer engineering major from Portland, Oregon; and Ryan Williams, a computer engineering major from Las Vegas.</p><p><strong>Gaitway</strong> are transportable, collapsible parallel bars for physical therapists to use when working with children. Unlike other designs, Gaitway can be used by children as young as 15 months and as old as 10 and can support up to 150 pounds.</p><p>Inventors: Two industrial design majors &ndash; Nora Johnson from Tampa; and Veronica Young from McDonough, Ga.</p><p><strong>InternBlitz</strong> takes the digital college application system of the Common App and applies it to internships. With more than 600 internships to choose from, students can apply for 15 different internships in just five minutes.</p><p>Inventors: Murtaza Bambot, an industrial engineering major from Duluth, Ga.; and Nathan Dass, a computer science major from Woodbridge, Va.</p><p><strong>PickAR</strong> is like Google Maps for warehouses. The team invented a headset, which uses augmented reality technology to overlay picking information and directions to packages so warehouses can find and process orders more efficiently.</p><p>Inventors: Three computer science majors &ndash; Cheng Hann Gan from Wheaton, Ill.; Sarthak Srinivas from Bangalore, India; and Wenqi Xian from Beijing.</p><p>The winning team will take home $20,000 and will represent Georgia Tech in the annual <a href="http://accinventureprize.com">ACC InVenture Prize</a>, taking place on campus March 31.</p><p>The second-place team earns $10,000.</p><p>Both first- and second-place finishers will receive free U.S. patent filings by Georgia Tech&rsquo;s Office of Technology Licensing and a spot in Georgia Tech&rsquo;s startup accelerator program, Flashpoint.</p><p>A $5,000 People&rsquo;s Choice Award will go to the fans&rsquo; favorite invention. Voting will be held online and by text messaging during the finale.</p><p>The finale will take place March 15 at the Ferst Center for the Arts. Tickets are free and can be requested <a href="http://inventureprize.gatech.edu/inventure-prize-ticket-request-form">here</a>.</p><p>The event will also be aired live on Georgia Public Broadcasting.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1487023719</created>  <gmt_created>2017-02-13 22:08:39</gmt_created>  <changed>1487023873</changed>  <gmt_changed>2017-02-13 22:11:13</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Six teams are competing for $35,000 in prizes. The InVenture Prize finale will take place March 15 at the Ferst Center for the Arts. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Six teams are competing for $35,000 in prizes. The InVenture Prize finale will take place March 15 at the Ferst Center for the Arts. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2017-02-13T00:00:00-05:00</dateline>  <iso_dateline>2017-02-13T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-02-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>113971</item>          <item>47390</item>      </media>  <hg_media>          <item>          <nid>113971</nid>          <type>image</type>          <title><![CDATA[Inventure Prize Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[inventure_logo.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/inventure_logo_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/inventure_logo_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/inventure_logo_0.jpg?itok=L3TfsTNq]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Inventure Prize Logo]]></image_alt>                    <created>1449178226</created>          <gmt_created>2015-12-03 21:30:26</gmt_created>          <changed>1475894733</changed>          <gmt_changed>2016-10-08 02:45:33</gmt_changed>      </item>          <item>          <nid>47390</nid>          <type>image</type>          <title><![CDATA[InVenture Prize Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[tne92353.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/tne92353.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tne92353.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/tne92353.jpg?itok=WhhIn_5z]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[InVenture Prize Logo]]></image_alt>                    <created>1449175107</created>          <gmt_created>2015-12-03 20:38:27</gmt_created>          <changed>1475894442</changed>          <gmt_changed>2016-10-08 02:40:42</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://inventureprize.gatech.edu]]></url>        <title><![CDATA[The InVenture Prize]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="3472"><![CDATA[entrepreneurship]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="169753"><![CDATA[student startups]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="587359">  <title><![CDATA[Simulated Ransomware Attack Shows Vulnerability of Industrial Controls]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. After gaining access, the researchers&nbsp;were able to command programmable logic controllers (PLCs) to shut valves, increase the amount of chlorine added to water, and display false readings.</p><p>The simulated attack was designed to highlight vulnerabilities in the control systems used to operate industrial facilities such as manufacturing plants, water and wastewater treatment facilities, and building management systems for controlling escalators, elevators and HVAC systems. Believed to be the first to demonstrate ransomware compromise of real PLCs, the research is scheduled to be presented February 13 at the RSA Conference in San Francisco.</p><p>Though no real ransomware attacks have been publicly reported on the process control components of industrial control systems, the attacks have become a significant problem for patient data in hospitals and customer data in businesses. Attackers gain access to these systems and encrypt the data, demanding a ransom to provide the encryption key that allows the data to be used again.&nbsp;</p><p>Ransomware generated an estimated $200 million for attackers during the first quarter of 2016, and the researchers believe it&rsquo;s only a matter of time before critical industrial systems are compromised and held for ransom.</p><p>&ldquo;We are expecting ransomware to go one step farther, beyond the customer data to compromise the control systems themselves,&rdquo; said David Formby, a Ph.D. student in the Georgia Tech School of Electrical and Computer Engineering. &ldquo;That could allow attackers to hold hostage critical systems such as water treatment plants and manufacturing facilities. Compromising the programmable logic controllers (PLCs) in these systems is a next logical step for these attackers.&rdquo;</p><p>Many industrial control systems lack strong security protocols, said <a href="https://www.ece.gatech.edu/faculty-staff-directory/abdul-r-beyah">Raheem Beyah</a>, the Motorola Foundation Professor and associate chair in the <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> and Formby&rsquo;s faculty advisor. That&rsquo;s likely because these systems haven&rsquo;t been targeted by ransomware so far, and because their vulnerabilities may not be well understood by their operators.</p><p>Formby and Beyah used a specialized search program to locate 1,400 PLCs of a single type that were directly accessible across the internet. But most such devices are located behind business systems that provide some level of protection &ndash; until they are compromised. Once attackers get into a business system, they could pivot to enter control systems if they are not properly walled off.</p><p>&ldquo;Many control systems assume that once you have access to the network, that you are authorized to make changes to the control systems,&rdquo; Formby said. &ldquo;They may have very weak password policies and security policies that could let intruders take control of pumps, valves and other key components of the industrial control system.&rdquo;</p><p>In the past, control systems weren&rsquo;t designed for connection to the internet, and many users of the systems assume they aren&rsquo;t on the public network and therefore not susceptible to attack. Control systems may also have connections that are unknown to operators, including access points installed to allow maintenance, troubleshooting and updates.</p><p>&ldquo;There are common misconceptions about what is connected to the internet,&rdquo; said Formby. &ldquo;Operators may believe their systems are air-gapped and that there&rsquo;s no way to access the controllers, but these systems are often connected in some way.&rdquo;</p><p>To launch the research, the researchers identified several common PLCs in use at industrial facilities. They obtained three different devices and tested their security setup, including password protection and susceptibility to settings changes. The devices were then combined with pumps, tubes and tanks to create a simulated water treatment facility. In the place of chlorine normally used to disinfect water, the researchers used iodine. They also added starch to their water supply, which turned bright blue when a simulated attack added iodine to it.</p><p>&ldquo;We were able to simulate a hacker who had gained access to this part of the system and is holding it hostage by threatening to dump large amounts of chlorine into the water unless the operator pays a ransom,&rdquo; Formby said. &ldquo;In the right amount, chlorine disinfects the water and makes it safe to drink. But too much chlorine can create a bad reaction that would make the water unsafe.&rdquo;</p><p>Vulnerabilities in control systems have been known for more than a decade, but until the growth of ransomware, attackers had not been able to benefit financially from compromising the systems. As other ransomware targets become more difficult, Beyah believes attackers may turn to easier targets in the industrial control systems.</p><p>&ldquo;It&rsquo;s quite likely that nation-state operators are already familiar with this and have attacks that they could use for political purposes, but ordinary attackers have had no interest in these systems,&rdquo; he said. &ldquo;What we hope to do is bring attention to this issue. If we can successfully attack these control systems, others with a bad intention can also do it.&rdquo;</p><p>In addition to improving password security and limiting connections, Beyah says operators of these devices need to install intrusion monitoring systems to alert them if attackers are in the process control networks. Beyah and Formby have launched a company to make their strategies for protecting systems broadly available to control system operators.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp; 30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (404-385-1933) (ben.brumfield@comm.gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1487016553</created>  <gmt_created>2017-02-13 20:09:13</gmt_created>  <changed>1487016736</changed>  <gmt_changed>2017-02-13 20:12:16</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Cybersecurity researchers have developed a new form of ransomware that was able to take over control of a simulated water treatment plant.]]></teaser>  <type>news</type>  <sentence><![CDATA[Cybersecurity researchers have developed a new form of ransomware that was able to take over control of a simulated water treatment plant.]]></sentence>  <summary><![CDATA[<p>Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that was able to take over control of a simulated water treatment plant. After gaining access, they were able to command programmable logic controllers (PLCs) to shut valves, increase the amount of chlorine added to water, and display false readings.</p>]]></summary>  <dateline>2017-02-13T00:00:00-05:00</dateline>  <iso_dateline>2017-02-13T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-02-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>587334</item>          <item>587335</item>      </media>  <hg_media>          <item>          <nid>587334</nid>          <type>image</type>          <title><![CDATA[Simulated water treatment plant]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Ransomware6863.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Ransomware6863.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Ransomware6863.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Ransomware6863.jpg?itok=_Qk_QU3r]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Simulated water treatment plant]]></image_alt>                    <created>1487009924</created>          <gmt_created>2017-02-13 18:18:44</gmt_created>          <changed>1487009924</changed>          <gmt_changed>2017-02-13 18:18:44</gmt_changed>      </item>          <item>          <nid>587335</nid>          <type>image</type>          <title><![CDATA[Simulated water treatment plant2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Ransomware6879.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Ransomware6879.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Ransomware6879.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Ransomware6879.jpg?itok=ygl2UcKx]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Simulated water treatment plant]]></image_alt>                    <created>1487010129</created>          <gmt_created>2017-02-13 18:22:09</gmt_created>          <changed>1487010129</changed>          <gmt_changed>2017-02-13 18:22:09</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="173459"><![CDATA[ransomware]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="173461"><![CDATA[PLC]]></keyword>          <keyword tid="173460"><![CDATA[programmable logic controller]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="586828">  <title><![CDATA[Looking for Entangled Atoms in a Bose-Einstein Condensate]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Using a Bose-Einstein condensate composed of millions of sodium atoms, researchers at the Georgia Institute of Technology have observed a sharp magnetically-induced quantum phase transition where they expect to find entangled atomic pairs. The work moves scientists closer to an elusive entangled state that would have potential sensing and computing applications beyond its basic science interests.</p><p>The use of entangled atoms from a condensate could improve the sensitivity and reduce the noise in sensing very small changes in physical properties such as magnetic fields or rotation. And it could also provide a foundation for quantum computers able to perform certain calculations much faster than conventional digital computers.&nbsp;</p><p>Sponsored by the National Science Foundation, the research was reported January 23 as a rapid communication in the journal <em>Physical Review A</em>.&nbsp;</p><p>&ldquo;We have defined a window where we expect to be able to observe entanglement,&rdquo; said <a href="http://www.physics.gatech.edu/user/chandra-raman">Chandra Raman</a>, an associate professor in the Georgia Tech <a href="http://www.physics.gatech.edu">School of Physics</a>. &ldquo;We now know where to look for it, and we know how to look for it.&rdquo;</p><p>Raman and former graduate student Anshuman Vinit have been studying Bose-Einstein condensates (BECs) as a source of entanglement, seeking to take advantage of the system&rsquo;s quantum purity to create conditions where correlation between atoms might occur. BECs don&rsquo;t normally contain entangled atoms.&nbsp;</p><p>&ldquo;We found ways to engineer the system to create entanglement,&rdquo; Raman explained. &ldquo;We looked at the behavior of the system as we tuned the magnetic field very close to the phase boundary and showed that the boundary had a very sharply defined point. We were able to resolve that boundary with a level of uncertainty we didn&rsquo;t think we could get until we did the experiment.&rdquo;</p><p>Theoretical predictions have suggested that at the boundary between different magnetic phases of a spinor Bose-Einstein condensate, scientists would find an entangled quantum state of all the atoms. In spinor Bose-Einstein condensates, the individual magnetic moments do not need to have a well-defined orientation in space, but rather, can exist in a superposition of different orientations. &nbsp;</p><p>In their experiment, the researchers identified two phases: antiferromagnetic and polar. In the polar phase, the atoms all align their moments vertically, while in the antiferromagnetic phase, they are horizontally aligned. &nbsp;In a BEC exactly at the boundary between these phases, theorists had predicted the existence of a quantum mechanical superposition of all possible alignments, an entangled state.&nbsp;</p><p>The researchers haven&rsquo;t yet observed that entangled state yet, but their work so far has defined an experimental window within which to look for new physical effects governing different magnetic phases, or to generate entangled states that are relevant for quantum-based systems.</p><p>Earlier research in Raman&rsquo;s lab had produced the two phases, but the boundary between them was &ldquo;smeared out&rdquo; by magnetic field inhomogeneities. By smoothing out the magnetic field so that it was more uniform, the researchers were able to eliminate the variations to produce a sharp boundary between the phases.</p><p>In the narrowly-defined transition area identified in the research, atoms are torn between the two phases, causing entangled pairs to form, Raman said. The state may be stable enough to find practical applications, though scientists won&rsquo;t know for sure until they actually can observe and measure the properties.&nbsp;</p><p>The researchers measured the boundary in their system by &ldquo;jumping&rdquo; the magnetic field from one part of the BEC to another. The move created a dynamical instability in the atomic system; the larger the instability, the less time the system required to return to equilibrium, as predicted by quantum theory.</p><p>The researchers now believe they&rsquo;ve set the stage for observing entanglement in a smaller groups of atoms, perhaps no more than a thousand.&nbsp;</p><p>&ldquo;At our current sensitivity, we think we could observe these spin-correlated states with a reasonable number of particles,&rdquo; Raman said. &ldquo;We think that is experimentally feasible, and since we can measure the boundary with precision, we can begin to test the theories governing behavior in this regime.&rdquo;</p><p>Once that&rsquo;s shown, the large ensemble of atoms could be broken down into many smaller groups operating independently, each with phase boundaries containing entangled atoms.&nbsp;</p><p>Though Raman finds the basic science and quantum computing interesting, he is equally excited about potential sensing applications. &nbsp;</p><p>&ldquo;If you could reduce the noise level through the clever use of quantum mechanical superpositions, you could realize sensors that are more precise and could detect smaller effects,&rdquo; he said. &ldquo;In quantum sensing you could use entanglement to increase the precision of measurements to levels that, in classical sensor systems, would have a higher noise level.&rdquo;</p><p>In classical oscillating systems such as coin tosses, each flip is an independent system and has a certain level of noise. But because of the correlation, the atomic pairs would no longer be independent systems.&nbsp;</p><p>&ldquo;In an ordinary classical system, there&rsquo;s a certain amount of noise that has to do with the fact that you are making measurements on independent systems,&rdquo; he said. &ldquo;In quantum systems, it is possible to suppress that noise if the atoms are correlated. It&rsquo;s as if the coins were talking to one another.&rdquo;</p><p>Quantum sensors might therefore be able to detect changes in rotation or magnetic variation that are too small for today&rsquo;s sensors. Other applications could be found in spectroscopic measurement, Raman said.</p><p><em>This material is based upon work supported by the National Science Foundation under Grant No. 1100179. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.</em></p><p><strong>CITATION</strong>: A. Vinit and C. Raman, &ldquo;Precise measurements on a quantum phase transition in antiferromagnetic spinor Bose-Einstein condensates,&rdquo; (Physical Review A, 2017). <a href="https://doi.org/10.1103/PhysRevA.95.011603">https://doi.org/10.1103/PhysRevA.95.011603</a></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1486062905</created>  <gmt_created>2017-02-02 19:15:05</gmt_created>  <changed>1486420622</changed>  <gmt_changed>2017-02-06 22:37:02</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Using a Bose-Einstein condensate composed of sodium atoms, Georgia Tech researchers have observed a sharp magnetically-induced quantum phase transition where they expect to find entangled atomic pairs. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Using a Bose-Einstein condensate composed of sodium atoms, Georgia Tech researchers have observed a sharp magnetically-induced quantum phase transition where they expect to find entangled atomic pairs. ]]></sentence>  <summary><![CDATA[<p>Using a Bose-Einstein condensate composed of millions of sodium atoms, researchers at the Georgia Institute of Technology have observed a sharp magnetically-induced quantum phase transition where they expect to find entangled atomic pairs. The work moves scientists closer to an elusive entangled state that would have potential sensing and computing applications beyond its basic science interests.</p>]]></summary>  <dateline>2017-02-02T00:00:00-05:00</dateline>  <iso_dateline>2017-02-02T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-02-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>586823</item>          <item>586826</item>      </media>  <hg_media>          <item>          <nid>586823</nid>          <type>image</type>          <title><![CDATA[Associate Professor Chandra Raman]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bec-entanglement1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bec-entanglement1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bec-entanglement1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bec-entanglement1.jpg?itok=Uhr4daeQ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Associate professor Chandra Raman]]></image_alt>                    <created>1486062036</created>          <gmt_created>2017-02-02 19:00:36</gmt_created>          <changed>1486062036</changed>          <gmt_changed>2017-02-02 19:00:36</gmt_changed>      </item>          <item>          <nid>586826</nid>          <type>image</type>          <title><![CDATA[Studying Bose-Einstein condensates]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bec-entanglement3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bec-entanglement3.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bec-entanglement3.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bec-entanglement3.jpg?itok=RnG0yDji]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Studying Bose-Einstein condensates]]></image_alt>                    <created>1486062163</created>          <gmt_created>2017-02-02 19:02:43</gmt_created>          <changed>1486062163</changed>          <gmt_changed>2017-02-02 19:02:43</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="1278"><![CDATA[College of Sciences]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="63761"><![CDATA[Bose-Einstein condensate]]></keyword>          <keyword tid="173381"><![CDATA[entangled]]></keyword>          <keyword tid="173380"><![CDATA[quantum entanglement]]></keyword>          <keyword tid="169638"><![CDATA[sensing]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="586536">  <title><![CDATA[Internet of Things Center Continues to Grow, Make Global Impact]]></title>  <uid>28797</uid>  <body><![CDATA[<p>The Center for the Development and Application of Internet of things Technologies (CDAIT) continues to expand in membership and impact.</p><p>Since launching in 2014, CDAIT has grown from three founding members to eighteen, including the following companies from the United States, Asia, Australia and Europe:</p><ul><li>AIG</li><li>Amazon</li><li>AT&amp;T</li><li>Brambles</li><li>Cisco</li><li>Comcast</li><li>Corning</li><li>Flex</li><li>Global Payments</li><li>IBM</li><li>Infor</li><li>Landis+Gyr</li><li>Merial (Boehringer Ingelheim)</li><li>Samsung</li><li>Stanley Black &amp; Decker</li><li>Verizon</li><li>VMware Airwatch</li><li>Wipro</li></ul><p>The center, dedicated to Internet of Things (IoT) interdisciplinary research, education and industry outreach, has also grown in influence.</p><p>A &ldquo;green paper&rdquo; released on January 12 by the National Telecommunications and Information Administration (NTIA) at the U.S. Department of Commerce titled &ldquo;<a href="https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf">Fostering the Advancement of the Internet of Things</a>&rdquo; included input from CDAIT&rsquo;s managing director, Alain Louchez. Reviewing the nature of IoT, the study &nbsp;quoted Louchez as saying, &ldquo;Of all the many facets of the Internet of Things as it is understood today, the one single groundbreaking element is not the connectivity&hellip; [but] the smartness of things.&rdquo;</p><p>Also announced in January, CDAIT was named one of the best IoT blogs/websites by the <a href="http://internetofmorethings.com/best-iot-blogs/">Internet of More Things</a>. CDAIT was commended for providing &ldquo;informative analysis.&rdquo;</p><p>In addition to corporate members, CDAIT has reached out to non-for-profit IoT-focused organizations and signed two memoranda of understanding; the first one with the International Telecommunication Union, a specialized agency of the United Nations and its Study Group 20 - Internet of Things (IoT) and its applications including smart cities and communities; and the second with the Centre of Excellence for Internet of Things of India&rsquo;s National Association of Software and Services Companies.</p><p>Furthermore, CDAIT&rsquo;s managing director was recently selected by Instituto Tecnol&oacute;gico y de Estudios Superiores de Monterrey (Guadalajara) as an international advisor to &ldquo;Centro de Innovaci&oacute;n, Desarrollo Tecnol&oacute;gico y Aplicaciones de Internet de las Cosas&rdquo; (a.k.a. &ldquo;Center of Innovation in Internet of Things or CIIoT&rdquo;) after bid approval by the government of Mexico in June 2016.</p><p>As CDAIT&rsquo;s influence grows globally, Louchez has been invited to join the distinguished international panel of judges for the <a href="http://www.iotglobalnetwork.com/">IoT Global Network</a> Awards 2017.</p><p>&ldquo;These are small steps, but they are important steps,&rdquo; Louchez said. &ldquo;These recognitions show that we are having an impact and the world is beginning to take notice. Georgia Tech is a resource for all seeking to innovate in the Internet of Things space, and thanks to the forward-looking and forward-thinking companies and individuals who have joined us, we are having influence on how the Internet of Things will take shape.&rdquo;</p><p>So far the CDAIT board members have met four times, with the next meeting scheduled for April. At that meeting, members will receive updates on various IoT-related activities, which are mostly conducted at CDAIT through five working groups that address critical IoT concerns such as education, startup ecosystem, thought leadership, research, and (latest addition) security and privacy.</p><p>&ldquo;We&rsquo;re very pleased with the way we have evolved over time,&rdquo; Louchez said. &ldquo;Our members are not only providing financial resources, but they also get directly involved, giving along the way a very much needed connection with industry needs and perspectives. Also central to our work is the effective and remarkable support we are receiving from the many institutes and centers across Georgia Tech that are engaged in IoT-related domains.&rdquo;</p><p>Housed at the Georgia Institute of Technology in the Georgia Tech Research Institute, CDAIT (pronounced &ldquo;sedate&rdquo;) is a global, non-profit, partner-funded center located in Atlanta, Georgia, United States, that fosters interdisciplinary research and education while driving general awareness about the Internet of Things. It aims at efficiently identifying, understanding and solving for its sponsors challenges and problems that may arise along the whole IoT value chain. CDAIT bridges sponsors with Georgia Tech faculty and researchers as well as industry members with similar interests.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1485535420</created>  <gmt_created>2017-01-27 16:43:40</gmt_created>  <changed>1485892834</changed>  <gmt_changed>2017-01-31 20:00:34</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Membership in the Internet of Things research center has reached 18 companies]]></teaser>  <type>news</type>  <sentence><![CDATA[Membership in the Internet of Things research center has reached 18 companies]]></sentence>  <summary><![CDATA[<p>CDAIT has been advising a new IoT center in Mexico and cited by Department of Commerce IoT report.</p>]]></summary>  <dateline>2017-01-27T00:00:00-05:00</dateline>  <iso_dateline>2017-01-27T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-01-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>lance.wallace@comm.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>586535</item>      </media>  <hg_media>          <item>          <nid>586535</nid>          <type>image</type>          <title><![CDATA[Alain Louchez of CDAIT consults with new IoT center in Mexico]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Louchez_Jalisco.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Louchez_Jalisco.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Louchez_Jalisco.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Louchez_Jalisco.jpg?itok=I8qovl5S]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1485534926</created>          <gmt_created>2017-01-27 16:35:26</gmt_created>          <changed>1485534926</changed>          <gmt_changed>2017-01-27 16:35:26</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://cdait.gatech.edu/]]></url>        <title><![CDATA[CDAIT]]></title>      </link>          <link>        <url><![CDATA[http://www.iotglobalnetwork.com/]]></url>        <title><![CDATA[IoT Global Network]]></title>      </link>          <link>        <url><![CDATA[http://internetofmorethings.com/best-iot-blogs/]]></url>        <title><![CDATA[Best IoT Blogs]]></title>      </link>          <link>        <url><![CDATA[https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf]]></url>        <title><![CDATA[Department of Commerce IoT Report]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="79601"><![CDATA[Alain Louchez]]></keyword>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="173063"><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="586685">  <title><![CDATA[Team Demonstrates Digital Health Platform for Department of Veterans Affairs]]></title>  <uid>27303</uid>  <body><![CDATA[<p>&ldquo;Liberate the data.&rdquo; That was a principal design goal for a team of public-private health care technology collaborators established by the U.S. Department of Veterans Affairs and Veterans Health Administration to develop a working and scalable proof-of-concept <a href="http://www.oit.va.gov/specialreports/dhp/index.html">digital health platform</a> (DHP) to support the department&rsquo;s long-term vision.</p><p>The open-source project demonstrated both proven and emerging technologies for interoperability and advanced functionality innovations from both the public and private sectors. The proof-of-concept delivers capabilities that VA and VHA leadership had identified as strategically important to support clinical and operational policy and program transformation plans needed to address expected changes in veteran populations, service needs and care delivery models.</p><p>For example, the demonstration included the capability to obtain patient data from disparate military and commercial electronic records systems, and accept information from a broad range of ancillary services and consumer medical devices.&nbsp;</p><p>The public-private collaboration, established in partnership with the VA&rsquo;s Office of Information and Technology, included the VHA, Office of the National Coordinator for Health Information Technology (ONC), the Georgia Institute of Technology and private-sector companies providing services in analytics, customer relationship management, and application program interfaces. Georgia Tech served as the project&rsquo;s lead architect and provided overall project management.&nbsp;</p><p>&ldquo;If you can liberate the data from deep inside a system and securely move it to the cloud and manage its movement through well-designed application programming interfaces (APIs), that gives you a lot of options for reorganizing work flows and processes,&rdquo; said Steve Rushing, senior strategic adviser in Georgia Tech&rsquo;s Health Extension Services. &ldquo;We are doing for health care what has already been done for other industries that have used interoperability standards as the foundation for APIs to exchange information among different systems.&rdquo;</p><p>The team &ndash; including partner organizations Salesforce (CRM), Mulesoft (API gateway), Apervita (real-time analytics) and UCB (portfolio of predictive analytics solutions for epilepsy) &ndash; conducted its first demonstration just six weeks after the contract with the VA was signed. Using Fast Healthcare Interoperability Resources (FHIR), a standard describing health data formats and elements, and a REST API transport protocol, the team built an API gateway surrounding VistA and Georgia Tech&rsquo;s testing and teaching electronic health record system, known as GTonFHIR. The project used anonymous patient data.&nbsp;</p><p>The overall project created 21 system APIs, which control how specific types of data flow into and out of the DHP. This included data exchanges with the Cerner EHR (representing the Department of Defense and a community hospital), Duke University Medical Center (Epic) as an academic medical provider, DocSnap personal health record (connecting to a Navy medicine pilot project), and personal health monitoring devices via Apple Healthkit and Validic.&nbsp;</p><p>Results of the proof-of-concept collaboration point to better experiences for veterans, said LaVerne Council, who was the VA&rsquo;s chief information officer at the time the project was conducted.&nbsp;</p><p>&ldquo;The DHP leverages the power of public-private partnerships,&rdquo; she said. &ldquo;We brought together some of the brightest engineers and health informaticists from some of the most innovative companies and assembled them at Georgia Tech. There, over a period of eight weeks, we established an API gateway, the cornerstone of the digital health platform, consisting of 21 APIs that connected to three different EHR systems including our own, VistA, a class leading customer relationship management system, Georgia Tech&rsquo;s Fast Healthcare Interoperability Resources (FHIR) server, and a real time analytics system. We also developed a veteran-facing mobile app. We integrated low-cost, high-quality video communication into the fabric of the veteran experience, and we integrated internet-connected health devices that track activities and vitals including blood pressure, weight and blood glucose.&rdquo;</p><p>Because the architecture is not tied to any proprietary system, the proof-of-concept accommodates future developments by connecting to and from other web services, apps, devices or electronic health systems that use the FHIR or other accepted industry open standards, Rushing said. Also, by keeping much of the original VistA system accessible via the API gateway, the strategy protects the investment in and could accelerate the deployment of the agency&rsquo;s existing health information technology innovations across the VHA system during the period of full DHP component acquisition and deployment, he explained.&nbsp;</p><p>&ldquo;In electronic health records, like almost any other major enterprise application, about 60 percent of the code is tied to routine workflow needed on a day-to-day basis. Changing these doesn&rsquo;t add strategic value because the new programming will look much like the old,&rdquo; Rushing said. &ldquo;The important strategic implementation is done at the edges of the system, and that&rsquo;s where the VA wanted us to focus our interoperability engineering and demonstrate the power of liberating the data. By using an architecture that is API-driven, we addressed the interoperability requirement, kept what works and added new VHA-created and private industry innovations where needed.&rdquo;</p><p>Among the innovations is an analytics layer. By studying the health records of service members transitioning from active duty to veteran status, the analytics layer makes recommendations about care, such as enrollment in specialized services for veterans suffering from traumatic brain injury (TBI).&nbsp;</p><p>&ldquo;This is basically doing the same thing &ndash; with a different intent &ndash; that happens every time you sign into Facebook or Amazon,&rdquo; said Rushing. &ldquo;The system learns about you from your records to help health professionals precisely meet your personal needs. Rather than wait until a veteran has a seizure because of a service-related injury, the system would use the analytics to recommend a protocol for proactively managing the problem.&rdquo;</p><p>As an independent third party, Georgia Tech combined the best components from the VA/VHA and private sector companies, negotiated any differences and worked with private-sector staff in five different programming teams to meet the VA&rsquo;s goals. &ldquo;We just wanted the best services for veterans,&rdquo; said Rushing. &ldquo;That was our driving objective.&rdquo;</p><p>The demonstration addressed the specific challenges of three groups of former service members: Iraq war veterans with traumatic brain injuries, women veterans who need gender-specific services not traditionally provided by the VA, and Vietnam-era veterans who are now suffering age-related illnesses such as diabetes and congestive heart failure. TBIs alone affect some 87,000 veterans.</p><p>The system was demonstrated to VA and VHA officials in September and October 2016, and the Georgia Tech team is now wrapping up the documentation for what has been done.&nbsp;</p><p>&ldquo;The VA is looking for a flexible, future-focused health platform and architecture focused on a services-based model,&rdquo; said Jon Duke, M.D., director of Georgia Tech&rsquo;s Center for Health Analytics and Informatics. &ldquo;They are taking a really ambitious approach to it, and this could have a tremendous impact on care for veterans as well as on health systems more broadly.&rdquo;</p><p>The project illustrates the role Georgia Tech can play because it doesn&rsquo;t have a medical school or hospital and isn&rsquo;t tied to any specific technology platform.</p><p>&ldquo;When we are working with health systems, we&rsquo;re neither a competitor nor a vendor,&rdquo; Duke noted. &ldquo;We approach each problem from a &lsquo;white hat&rsquo; perspective, working to find the right data and infrastructure needed, often using open-source platforms.&rdquo;</p><p>The impetus for the project was VHA strategic planning, started in the spring of 2016, on developing a successor to VistA, which has served the agency for 40 years. The strategic planning scope was expanded beyond replacement of VistA as a single EHR application system to include best practices driving enterprise information technology modernization across other industries. This included the move to a platform of interoperable cloud-based application system components.&nbsp;</p><p>The envisioned architecture with its &ldquo;liberated data&rdquo; allows for clinical and operational functionality extensions over time by connecting a robust portfolio of interoperable web services and mobile app innovations. By building out this architecture, the project demonstrated that these services and apps could be acquired and deployed in alignment with VA and VHA technology needs for systematically transforming clinical and operations work flows.&nbsp;</p><p>The proof-of-concept&rsquo;s scope of work included a tactically critical goal: treating VistA as just another EHR. The intent was for DHP to not only be agnostic regarding commercial EHRs, but agnostic toward VistA as well. &nbsp;This was achieved by moving VistA data and core modules to the cloud and leveraging existing successful VA initiatives to build open-source interoperable API gateway connections, such as the Enterprise Health Management Platform (eHMP).&nbsp;</p><p>The independence from commercial EHRs and VistA showed that VA investments in VistA modernization and VHA investments in industry leading healthcare information technologies, such as telemedicine and home monitoring, could move forward within the DHP deployment cycle and not wait for full deployment, Rushing said.&nbsp;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (404-385-1933) (ben.brumfield@comm.gatech.edu)</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1485878056</created>  <gmt_created>2017-01-31 15:54:16</gmt_created>  <changed>1485883614</changed>  <gmt_changed>2017-01-31 17:26:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A public-private team has developed a proof-of-concept digital health platform for the Department of Veterans Afffairs.]]></teaser>  <type>news</type>  <sentence><![CDATA[A public-private team has developed a proof-of-concept digital health platform for the Department of Veterans Afffairs.]]></sentence>  <summary><![CDATA[<p>&ldquo;Liberate the data.&rdquo; That was a principal design goal for a team of public-private health care technology collaborators established by the U.S. Department of Veterans Affairs and Veterans Health Administration to develop a working and scalable proof-of-concept digital health platform (DHP) to support the department&rsquo;s long-term vision.&nbsp;</p>]]></summary>  <dateline>2017-01-31T00:00:00-05:00</dateline>  <iso_dateline>2017-01-31T00:00:00-05:00</iso_dateline>  <gmt_dateline>2017-01-31 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>586681</item>          <item>586683</item>          <item>586684</item>      </media>  <hg_media>          <item>          <nid>586681</nid>          <type>image</type>          <title><![CDATA[Atlanta VA Medical Center]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[atlanta-va-medical.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/atlanta-va-medical.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/atlanta-va-medical.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/atlanta-va-medical.jpg?itok=0zehDQSL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Atlanta VA Medical Center]]></image_alt>                    <created>1485877377</created>          <gmt_created>2017-01-31 15:42:57</gmt_created>          <changed>1485877377</changed>          <gmt_changed>2017-01-31 15:42:57</gmt_changed>      </item>          <item>          <nid>586683</nid>          <type>image</type>          <title><![CDATA[Digital Health Platform screen]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[patient-record.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/patient-record.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/patient-record.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/patient-record.jpg?itok=lVWjjyT0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Simulated patient health record]]></image_alt>                    <created>1485877487</created>          <gmt_created>2017-01-31 15:44:47</gmt_created>          <changed>1485877487</changed>          <gmt_changed>2017-01-31 15:44:47</gmt_changed>      </item>          <item>          <nid>586684</nid>          <type>image</type>          <title><![CDATA[Digital Health Platform schematic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[dhp-schematic.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/dhp-schematic.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/dhp-schematic.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/dhp-schematic.jpg?itok=OqqWykU8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Digital health platform schematic]]></image_alt>                    <created>1485877602</created>          <gmt_created>2017-01-31 15:46:42</gmt_created>          <changed>1485877602</changed>          <gmt_changed>2017-01-31 15:46:42</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="41981"><![CDATA[health information]]></keyword>          <keyword tid="8677"><![CDATA[health information technology]]></keyword>          <keyword tid="173345"><![CDATA[digital health plaform]]></keyword>          <keyword tid="173346"><![CDATA[VistA]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="584587">  <title><![CDATA[President’s Cybersecurity Commission Releases Report]]></title>  <uid>27918</uid>  <body><![CDATA[<p>President Barack Obama received a report today from a bipartisan commission that <a href="https://www.whitehouse.gov/the-press-office/2016/12/02/statement-president-report-commission-enhancing-national-cybersecurity">addresses</a> cybersecurity challenges facing government and industry. Annie Ant&oacute;n, professor and chair of the Georgia Tech School of Interactive Computing, served on the Commission on Enhancing National Cybersecurity. She said the report includes opportunities for new research and advances in engineering.</p><p>The commission <a href="https://www.whitehouse.gov/sites/default/files/docs/cybersecurity_report.pdf">issued its consensus report</a> addressing six imperatives and offering action items that can be implemented by President-elect Donald Trump and his team.</p><p>Ant&oacute;n highlighted recommended steps that would be of special interest to Georgia Tech students, faculty and researchers.</p><p>The commission declared that cybersecurity should be a basic requirement for the accreditation of any programs in engineering and computing disciplines.</p><p>&ldquo;More than 1.5 million cybersecurity professionals are needed globally by 2020,&rdquo; Ant&oacute;n said.</p><p>She also emphasized the recommendation that all IoT (Internet of Things) devices should be secure by default. These devices include everything from refrigerators to fitness trackers to the drill of an oil rig.</p><p>&ldquo;This is a game changer because it takes the burden off the end users and places it on the engineers and manufacturers who design and create IoT products,&rdquo; she said.</p><p>Another action item calls on the federal government to make the development of&nbsp;usable, affordable and inherently secure resilient systems its top priority for cybersecurity research and development.</p><p>Ant&oacute;n also stressed a recommendation for the federal government to support cybersecurity-focused research in traditionally underfunded areas such as policy, law and the social impacts of privacy and security technologies, as well as issues specific to small and medium-sized businesses.</p><p>&ldquo;This highlights the need for more interdisciplinary classes and research,&rdquo; she said. &ldquo;It became clear to the commission that the human factors of cybersecurity are not well understood and require focused research nationally.&rdquo;</p><p>Georgia Tech is already working in the area through programs such as the Institute&rsquo;s&nbsp;Privacy Technology, Policy and Law course, Ant&oacute;n said. &nbsp;</p><p>The commission was created in February by presidential executive order as part of the Cybersecurity National Action Plan. The group, which has been working since April, was tasked with making detailed recommendations on ways to strengthen cybersecurity in public and private sectors.</p><p>The 12-person nonpartisan commission included cybersecurity experts from government, academia and industry.</p><p>&ldquo;The quality of thoughtful deliberation and debate among the commissioners was inspiring throughout this past year,&rdquo; Ant&oacute;n said. &ldquo;Debates were not held along party lines, but instead were constructive and focused solely on determining what was best for our nation and for securing the digital economy.&rdquo;</p><p>Ant&oacute;n, an expert on software compliance with federal privacy and security regulations, has served on a number of privacy and security advisory boards, including for the U.S. Department of Homeland Security and the National Institute of Standards and Technologies.</p><p>See a full list of commission members <a href="https://www.nist.gov/cybercommission/commissioners">here</a>.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1480715961</created>  <gmt_created>2016-12-02 21:59:21</gmt_created>  <changed>1480944798</changed>  <gmt_changed>2016-12-05 13:33:18</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Annie Antón, professor and chair of the School of Interactive Computing, served on the Commission on Enhancing National Security.]]></teaser>  <type>news</type>  <sentence><![CDATA[Annie Antón, professor and chair of the School of Interactive Computing, served on the Commission on Enhancing National Security.]]></sentence>  <summary><![CDATA[<p>Annie Ant&oacute;n, professor and chair of the Georgia Tech School of Interactive Computing, served on the Commission on Enhancing National Cybersecurity. She said the group&#39;s report&nbsp;includes opportunities for new research and advances in engineering.&nbsp;</p>]]></summary>  <dateline>2016-12-02T00:00:00-05:00</dateline>  <iso_dateline>2016-12-02T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-12-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>522611</item>      </media>  <hg_media>          <item>          <nid>522611</nid>          <type>image</type>          <title><![CDATA[Annie Antón photo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[annie-anton1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/annie-anton1_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/annie-anton1_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/annie-anton1_0.jpg?itok=myRxgTGa]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1460134800</created>          <gmt_created>2016-04-08 17:00:00</gmt_created>          <changed>1480708522</changed>          <gmt_changed>2016-12-02 19:55:22</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.whitehouse.gov/sites/default/files/docs/cybersecurity_report.pdf]]></url>        <title><![CDATA[Report from the Commission on Enhancing National Cybersecurity]]></title>      </link>          <link>        <url><![CDATA[http://www.cc.gatech.edu/~aianton/]]></url>        <title><![CDATA[Annie Antón]]></title>      </link>          <link>        <url><![CDATA[https://www.nist.gov/cybercommission]]></url>        <title><![CDATA[Commission on Enhancing National Cybersecurity]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="155"><![CDATA[Congressional Testimony]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="155"><![CDATA[Congressional Testimony]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="145981"><![CDATA[IISP]]></keyword>          <keyword tid="815"><![CDATA[economic development]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="584327">  <title><![CDATA[$17 Million Contract Will Help Establish Science of Cyber Attribution]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The Georgia Institute of Technology has been awarded a $17.3 million cyber security research contract to help establish new science around the ability to quickly, objectively and positively identify the virtual actors responsible for cyberattacks, a technique known as &quot;attribution.&quot;</p><p>While the tools and techniques to be developed during the four-and-a-half year effort won&#39;t point directly to the individuals responsible, the initiative will provide proof of involvement by specific groups, identifiable by their methods of attack, consistent errors and other unique characteristics. Such attribution could support potential sanctions and policy decisions &ndash; and discourage attacks by providing transparency for activities that are normally hidden.</p><p>The research, sponsored by the U.S. Department of Defense, will be led by researchers at the Georgia Institute of Technology, in collaboration with other academic institutions and companies. The project is expected to create an attribution framework dubbed Rhamnousia &ndash; in Greek mythology, the goddess of Rhamnous and the spirit of divine retribution.</p><p>&quot;We should know who our friends are and who our enemies are in the cyber domain,&rdquo; said Manos Antonakakis, an assistant professor in Georgia Tech&#39;s School of Electrical and Computer Engineering and the project&#39;s principal investigator. &quot;We owe it to the people of this country to objectively reason about the actors attacking systems, stealing intellectual property and tampering with our data. We want to take away the potential deniability that these attack groups now have.&quot;</p><p>Attributing attacks to specific groups or individuals could be partially achieved today, but it is largely a manual process that requires highly skilled investigators and weeks or months to complete. Rhamnousia will accelerate that process and provide both scientific reasoning and hard evidence about the guilty parties.</p><p>&quot;We have a limited number of people working in cybersecurity and attacks occur every day, so we need to be able to optimize the forensic analysis that would lead to attribution,&quot; Antonakakis said. &quot;In this project, we will use machine learning and algorithms to scale up the attribution process to help companies and the government protect against those bad actors. We will provide a systematic and scientific way to deal with the attacks.&quot;</p><p>Michael Farrell, chief scientist of the Cyber Technology and Information Security Laboratory at the Georgia Tech Research Institute (GTRI), is familiar with the issues the U.S. government faces due to an inability to identify those who are attacking U.S. interests in cyberspace. &ldquo;Deterrence is virtually impossible if you&rsquo;re unable to identify the adversary,&rdquo; he noted. &ldquo;Attribution is the linchpin for deterrence in cyberspace, and the U.S. government is in need of a repeatable and releasable way forward.&rdquo; &nbsp;</p><p>Farrell also serves as the associate director of the Institute for Information Security &amp; Privacy (IISP), and coordinates Georgia Tech&rsquo;s broad interests in attribution across campus. &ldquo;There is a policy and strategy component to attribution that is deeply intertwined with the technical solution,&rdquo; he added. &ldquo;Georgia Tech is well positioned to engage the broad spectrum of constituents who have an important role to play in this space: industry, academia, government, technology, policy, practitioners and decision-makers.&rdquo;&nbsp;</p><p>The new research effort will use data science and engineering techniques to sift through existing and new data sets to find relevant information.</p><p>&ldquo;Using a variety of data sets and analytical techniques, we can distill the information that will be useful to identifying the virtual cyber actors,&quot; Antonakakis said. &ldquo;These bad actors have to use the network and computer systems, and they have to interact with sources. They are leaving crumbs behind, and we can leverage those.&rdquo;</p><p>Rapid identification is important to companies and government organizations because the motives of the intruders suggest the kind of information they are seeking, the damage they can do and what the victims may use to stop the attack and minimize impacts.</p><p>&ldquo;For a business, it&#39;s very important to know whether you are being targeted by a commodity-type threat, a run-of-the-mill threat, or if you are being targeted by a specific group that may have ties to a government or to a competitor,&quot; Antonakakis said. &quot;The type of threat would affect business decisions.&quot;</p><p>Ultimately, the researchers hope to combine intrusion detection with attribution, allowing a quicker response &ndash; and helping victims cut off attackers more quickly.</p><p>From a technology standpoint, the project&rsquo;s goals include development of three specific areas:</p><ul><li>Efficient algorithmic attribution methods able to convert the research team&rsquo;s experience with manual attack attribution to novel, tensor-based learning methods. The algorithms will allow expansion of existing efforts to create a science of attribution and traceback;</li><li>Actionable attribution, in which the application of the algorithms will produce attribution reports to be shared with the attribution community;</li><li>Historic public attack datasets brought together into a single distributed environment.</li></ul><p>At Georgia Tech, the project will tap the expertise of researchers from the School of Electrical and Computer Engineering, College of Computing and GTRI. In addition to Antonakakis, the research team will include Dave Dagon, Doug Blough and Raheem Beyah from the School of Electrical and Computer Engineering and Mustaque Ahamad from the College of Computing.</p><p>Georgia Tech researchers have been involved in attribution research in support of cybersecurity efforts for many years. Researchers helped organize the Mariposa Working Group that helped identify the organizers of the Mariposa botnet.&nbsp;</p><p>&ldquo;Historically, attribution has been done primarily for law enforcement so they could put people behind bars and use that as a deterrent for others who might engage in these activities,&rdquo; said Antonakakis. &ldquo;We want to make sure that the people doing these attacks know that there is a very good chance that they will get caught and publicly attributed.&rdquo;&nbsp;</p><p><em>The Institute for Information Security &amp; Privacy (IISP) at Georgia Tech connects government, industry, and academia to solve the grand challenges of cybersecurity. As a coordinating body for nine information security labs dedicated to academic and solution-oriented applied research, the IISP leverages intellectual capital from across Georgia Tech and its external partners to address vital solutions for national security, economic continuity and individual safety.</em></p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Assistance</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1480387217</created>  <gmt_created>2016-11-29 02:40:17</gmt_created>  <changed>1480423043</changed>  <gmt_changed>2016-11-29 12:37:23</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech has been awarded $17.3 million to help establish new science of attribution.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech has been awarded $17.3 million to help establish new science of attribution.]]></sentence>  <summary><![CDATA[<p>The Georgia Institute of Technology has been awarded a $17.3 million cyber security research contract to help establish new science around the ability to quickly, objectively and positively identify the virtual actors responsible for cyberattacks, a technique known as &quot;attribution.&quot;</p>]]></summary>  <dateline>2016-11-29T00:00:00-05:00</dateline>  <iso_dateline>2016-11-29T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-11-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>584325</item>          <item>584326</item>      </media>  <hg_media>          <item>          <nid>584325</nid>          <type>image</type>          <title><![CDATA[Contract to Establish Science of Cyber Attribution1]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[attribution1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/attribution1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/attribution1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/attribution1.jpg?itok=FT-9io2L]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Developing attribution science]]></image_alt>                    <created>1480386261</created>          <gmt_created>2016-11-29 02:24:21</gmt_created>          <changed>1480386261</changed>          <gmt_changed>2016-11-29 02:24:21</gmt_changed>      </item>          <item>          <nid>584326</nid>          <type>image</type>          <title><![CDATA[Contract to Establish Science of Cyber Attribution2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[attribution2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/attribution2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/attribution2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/attribution2.jpg?itok=U7Vdzql5]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[developing cyber attribution]]></image_alt>                    <created>1480386551</created>          <gmt_created>2016-11-29 02:29:11</gmt_created>          <changed>1480386551</changed>          <gmt_changed>2016-11-29 02:29:11</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="172809"><![CDATA[attribution]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="71332">  <title><![CDATA[Georgia Tech Partnering to Create National Robotics Strategy]]></title>  <uid>27304</uid>  <body><![CDATA[<p>Citing the critical importance of the continued growth of robotics to U.S. competitiveness, 11 universities are taking the lead in developing an integrated national strategy for robotics research. The United States is the only nation engaged in advanced robotics research that does not have such a research roadmap.</p><p>The Computing Community Consortium (CCC), a program of the National Science Foundation, is providing support for developing the roadmap, which will be a unified research agenda for robotics across federal agencies, industry and the universities.</p><p>The effort began last year and includes representatives from the Georgia Institute of Technology, Carnegie Mellon University and the universities of Massachusetts, Pennsylvania, California- Berkeley, Southern California, Utah and Illinois, as well as Rensselaer Polytechnic Institute, Stanford University and Massachusetts Institute of Technology.</p><p>Henrik I. Christensen, the KUKA Chair of Robotics at Georgia Tech and a principal investigator for the CCC, is leading the group effort to develop the roadmap with the involvement of industry. This spring, a series of workshops are being organized and this fall a National Robotics Senior Leadership Conference in Washington, D.C., will take place. The conference will review the preliminary results from the workshops and take steps toward an integrated national research agenda. The roadmap will then be reported to the year-old Congressional Robotics Caucus, headed by U.S. Rep. Mike Doyle (D-Pa.) and U.S. Rep. Zach Wamp (R-Tenn.).</p><p>&quot;It is essential that the United States begins to solidly outline a leadership position in robotics,&quot; said Carnegie Mellon President Jared L. Cohon. &quot;Robotics already is having a transformative impact on the workplace, from the factory floor to hospital operating rooms. In the decades ahead, this impact can be extended to our homes and our highways to increase our ability to live independently and to save lives.&quot;</p><p>&quot;The planning process now getting under way is a historic opportunity to build upon broad-based collaboration among industry and academic leaders in the field of robotics,&quot; said Georgia Tech President Wayne Clough. &quot;We want to create a plan that will keep this nation competitive in a technology that is rapidly advancing.&quot;</p><p>The failure of the robotics community to previously speak with one voice has resulted in inconsistent funding and missed opportunities, said Matthew T. Mason, director of Carnegie Mellon&#39;s Robotics Institute. &quot;The technology is finding wider application, but its full potential is not fully appreciated by policy makers,&quot; he explained. &quot;We need to develop a common vision so that we can work effectively with the Congressional Robotics Caucus and with funding agencies.&quot;</p><p>Christensen noted that all of the planning events are designed to focus on the research needs that are vital to the development of a growing robotics industry.</p><p>&quot;Several key competencies are not available today,&quot; Christensen said. &quot;Through a community effort that includes end-users, industry and academia, the key challenges and opportunities will be identified. The workshops and conferences will allow us to develop a mature plan.&quot;</p><p>&quot;The key to the workshops will be the collaborative discussions between representatives from both academia and industry,&quot; stated John Reid, Director, Product Technology and Innovation at John Deere&#39;s Moline Technology Innovation Center. &quot;We need to proceed in a market-driven fashion to envision key future robotics-enabled capabilities and then map these capabilities to the required robotics technologies that we need to be researching and developing today.&quot;<br />Doyle and Wamp of the Congressional Robotics Caucus expressed enthusiasm for the effort.</p><p>&quot;We applaud the researchers at some of our nation&#39;s top universities for this effort to craft a national agenda for robotics research,&quot; they said in a statement released by the caucus. &quot;We especially want to commend the presidents of Carnegie Mellon and Georgia Tech for their initiative in organizing this conference. The Congressional Robotics Caucus looks forward to reviewing the results of this important work so that we can more fully understand the impact that robotics is likely to have on the future security and prosperity of our nation.&quot;<br />More information about the Community Computing Consortium can be found at:<br /><a href="http://www.cra.org/ccc/">www.cra.org/ccc/</a></p><p>The roadmapping effort is detailed at <a href="http://www.us-robotics.us">www.us-robotics.us</a></p><p><em><strong>About Carnegie Mellon:</strong> Carnegie Mellon is a private research university with a distinctive mix of programs in engineering, computer science, robotics, business, public policy, fine arts and the humanities. More than 10,000 undergraduate and graduate students receive an education characterized by its focus on creating and implementing solutions for real problems, interdisciplinary collaboration, and innovation. A small student-to-faculty ratio provides an opportunity for close interaction between students and professors. While technology is pervasive on its 144-acre Pittsburgh campus, Carnegie Mellon is also distinctive among leading research universities for the world-renowned programs in its College of Fine Arts. A global university, Carnegie Mellon has campuses in Silicon Valley, Calif., and Qatar, and programs in Asia, Australia and Europe. For more, see <a href="http://www.cmu.edu">www.cmu.edu</a>.</em></p>]]></body>  <author>Matthew Nagel</author>  <status>1</status>  <created>1208995200</created>  <gmt_created>2008-04-24 00:00:00</gmt_created>  <changed>1479847401</changed>  <gmt_changed>2016-11-22 20:43:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Academic Leaders Partner]]></teaser>  <type>news</type>  <sentence><![CDATA[Academic Leaders Partner]]></sentence>  <summary><![CDATA[<p>Citing the critical importance of the continued growth of robotics to U.S. competitiveness, 11 universities are taking the lead in developing an integrated national strategy for robotics research. The United States is the only nation engaged in advanced robotics research that does not have such a research roadmap.</p>]]></summary>  <dateline>2008-04-24T00:00:00-04:00</dateline>  <iso_dateline>2008-04-24T00:00:00-04:00</iso_dateline>  <gmt_dateline>2008-04-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Academic Leaders in Robotics Research Announce Effort To Create National Strategy for Robotics Growth]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[matthew.nagel@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Georgia Tech Media Relations</strong><br />Laura Diamond<br /><a href="mailto:laura.diamond@comm.gatech.edu">laura.diamond@comm.gatech.edu</a><br />404-894-6016<br />Jason Maderer<br /><a href="mailto:maderer@gatech.edu">maderer@gatech.edu</a><br />404-660-2926</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>71333</item>      </media>  <hg_media>          <item>          <nid>71333</nid>          <type>image</type>          <title><![CDATA[Georgia Tech Robotics]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177367</created>          <gmt_created>2015-12-03 21:16:07</gmt_created>          <changed>1475894634</changed>          <gmt_changed>2016-10-08 02:43:54</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.us-robotics.us/]]></url>        <title><![CDATA[Roadmapping]]></title>      </link>          <link>        <url><![CDATA[http://www.cra.org/ccc/]]></url>        <title><![CDATA[Community Computing Consortium]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="2125"><![CDATA[Carnegie Mellon]]></keyword>          <keyword tid="109"><![CDATA[Georgia Tech]]></keyword>          <keyword tid="2126"><![CDATA[National Robotics Strategy]]></keyword>          <keyword tid="572"><![CDATA[partnership]]></keyword>          <keyword tid="667"><![CDATA[robotics]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="583212">  <title><![CDATA[Learning Morse Code without Trying]]></title>  <uid>27560</uid>  <body><![CDATA[<p>It&rsquo;s not exactly beating something into someone&rsquo;s head. More like tapping it into the side.</p><p>Researchers at the Georgia Institute of Technology have developed a system that teaches people Morse code within four hours using a series of vibrations felt near the ear. Participants wearing Google Glass learned it without paying attention to the signals &mdash;they played games while feeling the taps and hearing the corresponding letters. After those few hours, they were 94 percent accurate keying a sentence that included every letter of the alphabet and 98 percent accurate writing codes for every letter.</p><p>This is the latest chapter of passive haptic learning (PHL) studies at Georgia Tech. The same method &mdash; using vibrations while participants aren&rsquo;t paying attention &mdash; <a href="http://www.news.gatech.edu/2014/06/23/wearable-computing-gloves-can-teach-braille-even-if-you%E2%80%99re-not-paying-attention">has taught people braille</a>, <a href="http://www.news.gatech.edu/2008/11/07/reinventing-way-people-learn-play-piano">how to play the piano</a> and <a href="http://www.news.gatech.edu/hg/item/140221">improved hand sensation for those with partial spinal cord injury. </a></p><p>The PHL projects are all led by Georgia Tech Professor Thad Starner and his Ph.D. student Caitlyn Seim. The team decided to use Glass for this study because it has both a built-in speaker and tapper (Glass&rsquo;s bone-conduction transducer).</p><p>In the study, participants played a game while feeling vibration taps between their temple and ear. The taps represented the dots and dashes of Morse code and passively &ldquo;taught&rdquo; users through their tactile senses &mdash; even while they were distracted by the game.&nbsp;</p><p>The taps were created when researchers sent a very low-frequency signal to Glass&rsquo;s speaker system. At less than 15 Hz, the signal was below hearing range but, because it was played very slowly, the sound was felt as a vibration.&nbsp;</p><p>Half of the participants in the study felt the vibration taps and heads a voice prompt for each corresponding letter. The other half &mdash; the control group &mdash; felt no taps to help them learn.</p><p>Participants were tested throughout the study on their knowledge of Morse code and their ability to type it.&nbsp; After less than four hours of feeling every letter, everyone was challenged to type the alphabet in Morse code in a final test.</p><p>The control group was accurate only half the time.&nbsp; Those who felt the passive cues were nearly perfect.</p><p>The research was recently presented in Germany at the 20<sup>th</sup> International Symposium on Wearable Computers.</p><p>&ldquo;Does this new study mean that people will rush out to learn Morse code? Probably not,&rdquo; said Starner. &ldquo;It shows that PHL lowers the barrier to learn text-entry methods &mdash; something we need for smartwatches and any text-entry that doesn&rsquo;t require you to look at your device or keyboard.&rdquo;</p><p>Previous research on PHL used custom hardware to provide the tactile stimuli, but here researchers use an existing wearable device.&nbsp;</p><p>&ldquo;This research also shows that other common devices with an actuator could be used for passive haptic learning,&rdquo; he says. &ldquo;Your smartwatch, Bluetooth headset, fitness tracker or phone.&rdquo;</p><p>&ldquo;In our Braille and piano PHL studies, people felt vibrations on their fingers, then used their fingers for the task,&rdquo; said Seim. &ldquo;This study was different and surprising. People were tapped on their heads, but the skill they learned was using their finger.&rdquo;</p><p>Seim&rsquo;s next study will go a step further, investigating whether PHL can teach people how to type on the trusted QWERTY keyboard. That would mean several letters assigned to the same finger, rather than using only one finger like Morse code.</p><p><em>The work is supported in part by the National Science Foundation (Grant Number 1217473). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors. </em></p>]]></body>  <author>Jason Maderer</author>  <status>1</status>  <created>1477583378</created>  <gmt_created>2016-10-27 15:49:38</gmt_created>  <changed>1477583378</changed>  <gmt_changed>2016-10-27 15:49:38</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a system that teaches people Morse code within four hours using a series of vibrations felt near the ear]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a system that teaches people Morse code within four hours using a series of vibrations felt near the ear]]></sentence>  <summary><![CDATA[<p>Researchers have developed a system that teaches people Morse code within four hours using a series of vibrations felt near the ear. Participants wearing Google Glass learned it without paying attention to the signals &mdash;they played games while feeling the taps and hearing the corresponding letters. After those few hours, they were 94 percent accurate keying a sentence that included every letter of the alphabet and 98 percent accurate writing codes for every letter.</p>]]></summary>  <dateline>2016-10-27T00:00:00-04:00</dateline>  <iso_dateline>2016-10-27T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-10-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[New study demonstrates silent, eyes-free text entry]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[maderer@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jason Maderer<br />National Media Relations<br />maderer@gatech.edu<br />404-660-2926</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>416531</item>          <item>583210</item>          <item>583209</item>      </media>  <hg_media>          <item>          <nid>416531</nid>          <type>image</type>          <title><![CDATA[Thad Starner]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[thad_starner_2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/thad_starner_2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/thad_starner_2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/thad_starner_2_0.jpg?itok=L0rrGFeN]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Thad Starner]]></image_alt>                    <created>1449254258</created>          <gmt_created>2015-12-04 18:37:38</gmt_created>          <changed>1475895155</changed>          <gmt_changed>2016-10-08 02:52:35</gmt_changed>      </item>          <item>          <nid>583210</nid>          <type>image</type>          <title><![CDATA[Morse Code 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[InputTest2.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/InputTest2.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/InputTest2.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/InputTest2.jpeg?itok=MxDzfoMw]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1477581892</created>          <gmt_created>2016-10-27 15:24:52</gmt_created>          <changed>1477581892</changed>          <gmt_changed>2016-10-27 15:24:52</gmt_changed>      </item>          <item>          <nid>583209</nid>          <type>image</type>          <title><![CDATA[Morse Code 1]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[tap2.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/tap2.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tap2.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/tap2.jpeg?itok=VmCAxrhx]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1477581798</created>          <gmt_created>2016-10-27 15:23:18</gmt_created>          <changed>1477585830</changed>          <gmt_changed>2016-10-27 16:30:30</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1183"><![CDATA[Home]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>          <group id="1299"><![CDATA[GVU Center]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1944"><![CDATA[Thad Starner]]></keyword>          <keyword tid="82341"><![CDATA[Google Glass]]></keyword>          <keyword tid="132141"><![CDATA[wearables]]></keyword>          <keyword tid="172604"><![CDATA[Morse Code]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="582789">  <title><![CDATA[Study Finds “Lurking Malice” in Cloud Hosting Services]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised &ndash; with several hundred of the &ldquo;buckets&rdquo; actively providing malware. Such bad content could be challenging to find, however, because it can be rapidly assembled from stored components that individually may not appear to be malicious.</p><p>To identify the bad content, researchers created a scanning tool that looks for features unique to the bad repositories, known as &ldquo;Bars.&rdquo; The features included certain types of redirection schemes and &ldquo;gatekeeper&rdquo; elements designed to protect the malware from scanners. Researchers from the Georgia Institute of Technology, Indiana University Bloomington and the University of California Santa Barbara conducted the study.</p><p>Believed to be the first systematic study of cloud-based malicious activity, the research will be presented October 24 at the ACM Conference on Computer and Communications Security in Vienna, Austria. &nbsp;The work was supported in part by the National Science Foundation.</p><p>&ldquo;Bad actors have migrated to the cloud along with everybody else,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/abdul-r-beyah">Raheem Beyah</a>, a professor in Georgia Tech&rsquo;s <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a>. &ldquo;The bad guys are using the cloud to deliver malware and other nefarious things while remaining undetected. The resources they use are compromised in a variety of ways, from traditional exploits to simply taking advantage of poor configurations.&rdquo;</p><p>Beyah and graduate student Xiaojing Liao found that the bad actors could hide their activities by keeping components of their malware in separate repositories that by themselves didn&rsquo;t trigger traditional scanners. Only when they were needed to launch an attack were the different parts of this malware assembled.</p><p>&ldquo;Some exploits appear to be benign until they are assembled in a certain way,&rdquo; explained Beyah, who is the Motorola Foundation Professor and associate chair for strategic initiatives and innovation in the School of Electrical and Computer Engineering. &ldquo;When you scan the components in a piecemeal kind of way, you only see part of the malware, and the part you see may not be malicious.&rdquo;</p><p>In the cloud, malicious actors take advantage of how difficult it can be to scan so much storage. Operators of cloud hosting services may not have the resources to do the deep scans that may be necessary to find the Bars &ndash; and their monitoring of repositories may be limited by service-level agreements.</p><p>While splitting the malicious software up helped hide it, the strategy also created a technique for finding the &ldquo;bad buckets&rdquo; hosting it, Beyah said. Many of the bad actors had redundant repositories connected by specific kinds of redirection schemes that allowed attacks to continue if one bucket were lost. The bad buckets also usually had &ldquo;gatekeepers&rdquo; designed to keep scanners out of the repositories, and where webpages were served, they had simple structures that were easy to propagate.</p><p>&ldquo;We observed that there is an inherent structure associated with how these attackers have set things up,&rdquo; he explained. &ldquo;For instance, the bad guys all had bodyguards at the door. That&rsquo;s not normal for cloud storage, and we used that structure to detect them.&rdquo;</p><p>The researchers began by studying a small number of known bad repositories to understand how they were being used. Based on what they learned, they created &ldquo;BarFinder,&rdquo; a scanner tool that automatically searches for and detects features common to the bad repositories.&nbsp;</p><p>Overall, the researchers scanned more than 140,000 sites on 20 cloud hosting sites and found about 700 active repositories for malicious content. In total, about 10 percent of cloud repositories the team studied had been compromised in some way. The researchers notified the cloud hosting companies of their findings before publication of the study.</p><p>&ldquo;It&rsquo;s pervasive in the cloud,&rdquo; said Beyah. &ldquo;We found problems in every last one of the hosting services we studied. We believe this is a significant problem for the cloud hosting industry.&rdquo;</p><p>In some cases, the bad actors simply opened an inexpensive account and began hosting their software. In other cases, the malicious content was hidden in the cloud-based domains of well-known brands. Intermingling the bad content with good content in the brand domains protected the malware from blacklisting of the domain.</p><p>Beyah and Liao saw a wide range of attacks in the cloud hosted repositories, ranging from phishing and common drive-by downloads to fake antivirus and computer update sites. &ldquo;They can attack you directly from these buckets, or they can redirect you to other malicious buckets or a series of malicious buckets,&rdquo; he said. &ldquo;It can be difficult to see where the code is redirecting you.&rdquo;</p><p>To protect cloud-based repositories from these attacks, Beyah recommends the usual defenses, including patching of systems and proper configuration settings.&nbsp;</p><p>Looking ahead, the researchers hope to make BarFinder available to a broader audience. That could include licensing the technology to a security company, or making it available as an open-source tool.</p><p>&ldquo;Attackers are very clever, and as we secure things and make the cloud infrastructure more challenging for them to attack, they will move onto something else,&rdquo; he said. &ldquo;In the meantime, every system that we can secure makes the internet just a little bit safer.&rdquo;</p><p>Read about other <a href="http://iisp.gatech.edu/ccs-16">Georgia Tech presentations</a> at&nbsp;the ACM Conference on Computer and Communications Security.</p><p><em>This work was supported in part by the National Science Foundation (grants CNS-1223477, 1223495, 1527141 and 1618493). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.</em></p><p><strong>CITATION</strong>: Xiaojing Liao, et al., &ldquo;Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service,&rdquo; ACM Conference on Computer and Communications Security (CCS).</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia &nbsp;30332-0181 &nbsp;USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (jtoon@gatech.edu) or Ben Brumfield (ben.brumfield@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1476884055</created>  <gmt_created>2016-10-19 13:34:15</gmt_created>  <changed>1476884674</changed>  <gmt_changed>2016-10-19 13:44:34</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised.]]></teaser>  <type>news</type>  <sentence><![CDATA[A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised.]]></sentence>  <summary><![CDATA[<p>A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised &ndash; with several hundred of the &ldquo;buckets&rdquo; actively providing malware. Such bad content could be challenging to find, however, because it can be rapidly assembled from stored components that individually may not appear to be malicious.</p>]]></summary>  <dateline>2016-10-19T00:00:00-04:00</dateline>  <iso_dateline>2016-10-19T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-10-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>582784</item>          <item>582786</item>          <item>582788</item>      </media>  <hg_media>          <item>          <nid>582784</nid>          <type>image</type>          <title><![CDATA[Bad repositories map]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bad-repositories.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bad-repositories.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bad-repositories.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bad-repositories.jpg?itok=bBoOGQCR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1476883341</created>          <gmt_created>2016-10-19 13:22:21</gmt_created>          <changed>1476883341</changed>          <gmt_changed>2016-10-19 13:22:21</gmt_changed>      </item>          <item>          <nid>582786</nid>          <type>image</type>          <title><![CDATA[Xiaojing Liao]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cloud-malware.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cloud-malware.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cloud-malware.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cloud-malware.jpg?itok=UExZ-vWY]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1476883529</created>          <gmt_created>2016-10-19 13:25:29</gmt_created>          <changed>1476883529</changed>          <gmt_changed>2016-10-19 13:25:29</gmt_changed>      </item>          <item>          <nid>582788</nid>          <type>image</type>          <title><![CDATA[Raheem Beyah]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[raheem-beyah.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/raheem-beyah.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/raheem-beyah.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/raheem-beyah.jpg?itok=RbiWKwLU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Raheem Beyah]]></image_alt>                    <created>1476883619</created>          <gmt_created>2016-10-19 13:26:59</gmt_created>          <changed>1476883619</changed>          <gmt_changed>2016-10-19 13:26:59</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="172508"><![CDATA[malicious content]]></keyword>          <keyword tid="10807"><![CDATA[cloud computing]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="568521">  <title><![CDATA[Amazon Web Services Joins Georgia Tech’s Internet of Things Research Center]]></title>  <uid>28797</uid>  <body><![CDATA[<p>Georgia Tech’s Center for the Development and Application of Internet of Things Technologies (CDAIT) has added Amazon Web Services Inc. (AWS) to its growing list of members and launched four new working groups.</p><p>AWS is the most recent company to sign on to the research center, which now includes the following members from around the world:</p><ul><li>AirWatch by VMware (U.S.)</li><li>Amazon Web Services (U.S.)</li><li>AT&amp;T (U.S.)</li><li>Brambles (Australia)</li><li>Cisco (U.S.)</li><li>Corning (U.S.)</li><li>Flex (formerly Flextronics) (Singapore)</li><li>IBM (U.S.)</li><li>Infor (U.S.)</li><li>Merial [Sanofi] (France)</li><li>Samsung (South Korea)</li><li>Stanley Black and Decker (U.S.)</li><li>USAA (U.S.)</li><li>Wipro (India)</li></ul><p>“We are pleased to welcome AWS to the board of CDAIT,” said Jeff Evans, chairman of CDAIT’s Executive Advisory Board (EAB). “AWS is the latest company to place a high value on Georgia Tech’s breadth of expertise and depth of experience in technological research in the fields that impact the Internet of Things.”</p><p>Amazon Web Services will be represented on the CDAIT EAB by Mark Ryland, chief solutions architect, World Wide Public Sector Team, AWS.</p><p>“We are delighted to join Georgia Tech’s Center for the Development and Application of Internet of Things Technologies to further explore the huge potential of IoT technologies,” said Ryland. “This is a focus area for us, as our customers are eager to unlock that potential. The AWS Cloud plays a key role in easily and securely connecting devices, managing their state and providing analytics on the potentially massive amounts of data they produce, with automatic scaling to meet any customer’s needs.”</p><p>CDAIT has also launched four new working groups tackling education, chaired by Margaret Loper of the Georgia Tech Research Institute (GTRI); startup ecosystem, chaired by Tech Square Ventures’ Blake Patton; thought leadership, chaired by Cisco’s Scott Puopolo; and research, chaired by Kenji Takeuchi of Flex.</p><p>“These new groups are busy pulling together deliverables that will move the needle in the Internet of Things space worldwide,” said Alain Louchez, managing director of CDAIT. “Our vision of the center has always been focused on effective collaboration between university and industry, and we are extremely pleased with our progress in this regard.”</p><p>The Executive Advisory Board is scheduled to meet Dec. 7, 2016, at Georgia Tech in Atlanta.</p><p><strong>About CDAIT </strong></p><p>CDAIT (pronounced "sedate") is a global, non-profit, partner-funded center located in Atlanta that fosters interdisciplinary research and education while driving general awareness about the Internet of Things. It aims at efficiently identifying, understanding and solving for its sponsors challenges and problems that may arise along the whole IoT value chain. CDAIT bridges sponsors with Georgia Tech faculty and researchers as well as industry members with similar interests. To learn more about CDAIT, visit <a href="http://www.cdait.gatech.edu">www.cdait.gatech.edu</a>.&nbsp;</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1472146396</created>  <gmt_created>2016-08-25 17:33:16</gmt_created>  <changed>1475896946</changed>  <gmt_changed>2016-10-08 03:22:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Tech Center for the Development and Application of Internet of Things Technologies has expanded to include Amazon Web Services.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Tech Center for the Development and Application of Internet of Things Technologies has expanded to include Amazon Web Services.]]></sentence>  <summary><![CDATA[<p>Georgia Tech’s Center for the Development and Application of Internet of Things Technologies (CDAIT) has added Amazon Web Services Inc. (AWS) to its growing list of members and launched four new working groups. AWS is the most recent company to sign on to the research center, which now includes 14 members from around the world.</p>]]></summary>  <dateline>2016-08-25T00:00:00-04:00</dateline>  <iso_dateline>2016-08-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-08-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Lance Wallace</p><p><a href="mailto:lance.wallace@comm.gatech.edu">lance.wallace@comm.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>149551</item>      </media>  <hg_media>          <item>          <nid>149551</nid>          <type>image</type>          <title><![CDATA[Centergy One Building]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[centergy_one_building.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/centergy_one_building_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/centergy_one_building_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/centergy_one_building_0.jpg?itok=1nA4Twbs]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Centergy One Building]]></image_alt>                    <created>1449178763</created>          <gmt_created>2015-12-03 21:39:23</gmt_created>          <changed>1475894782</changed>          <gmt_changed>2016-10-08 02:46:22</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://cdait.gatech.edu/]]></url>        <title><![CDATA[Center for the Development and Application of Internet of Things Technologies]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="79601"><![CDATA[Alain Louchez]]></keyword>          <keyword tid="81501"><![CDATA[Amazon]]></keyword>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="556931">  <title><![CDATA[Monitoring Side-Channel Signals Could Detect Malicious Software on IoT Devices]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.</p><p>The technique will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. These signals are produced by semiconductors, capacitors, power supplies and other components, and can currently be measured up to a half-meter away from operating IoT devices.</p><p>By comparing these unintended side-channel emissions to a database of what the devices should be doing when they are operating normally, researchers can tell if malicious software has been installed.</p><p>“We will be looking at how the program is changing its behavior,” explained <a href="https://www.ece.gatech.edu/faculty-staff-directory/alenka-zajic">Alenka Zajic</a>, the project’s principal investigator and an assistant professor in the <a href="http://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. “If an Internet of Things device is attacked, the insertion of malware will affect the program that is running, and we can detect that remotely.”</p><p>The four-year project will also include two faculty members from Georgia Tech's <a href="http://www.scs.gatech.edu/">School of Computer Science</a>: Professors <a href="http://www.scs.gatech.edu/people/9736/milos-prvulovics">Milos Prvulovic</a> and <a href="http://www.scs.gatech.edu/people/9739/alessandro-orsos">Alessandro Orso</a>. Also part of the project will be a research team from Northrop-Grumman, headed by Matthew Welborn. Details of an early prototype of the side-channel technique, called “Zero-Overhead Profiling” because the monitoring doesn't affect the system being observed, were presented July 20th at the International Symposium on Software Testing and Analysis (ISSTA).</p><p>Within the next four years, an estimated 30 billion IoT devices will be in operation, doing everything from controlling home heating and air conditioning to sensing and managing critical infrastructure. The devices are usually small with limited processor power and memory. Their limited computing capabilities means they can’t run the kinds of malware protection software found on laptop computers, and they cannot use virtualization and other technology to protect the system software even when an application is taken over by an attacker. This means that once attackers compromise the internet-connected application, they typically “own” the entire IoT device and can even make it falsely respond to traditional queries about its own security status.</p><p>"The main challenge from a security perspective is to make these devices secure so somebody can't take them over," explained Zajic. "There will be a lot of processing power out there that needs to be monitored, but you can't just put traditional security software on that processor because is doesn't have enough power for both the security software and the tasks the device is supposed to be doing."</p><p>Zajic and Prvulovic pioneered research on measuring side-channel signals emitted from devices. These emissions differ from the signals the devices were intended to produce for communicating information across the Internet to other devices. The researchers have already shown that they can pick up the signals close to the devices using specially designed antennas, and one project goal is to extend the range to as much as three meters.</p><p>"When a processor executes instructions, values are represented as ones and zeroes, which creates a fluctuation in the current," Zajic said. "That creates changes in the electromagnetic field we are measuring, providing a pattern for what each part of the program looks like on a spectrum analyzer."</p><p>Key to detecting changes in the signals is getting a "before" recording of what these signals should look like to draw a comparison with an "after" set of signals for each combination of device and software. The researchers plan to evaluate each IoT device, sampling and recording its typical operation to create a database. To avoid recording overwhelming amounts of data, the system will take periodic samples from different stages of program loops.</p><p>"If somebody inserts something into the program loop, the peaks in the spectrum will shift and we can detect that," Zajic said. "This is something that we can monitor in real time using advanced pattern-matching technology that uses machine learning to improve its performance."</p><p>Detecting malware, however, is more of a challenge.</p><p>“The technique is currently 95 percent accurate at profiling – pinpointing the exact point in the IoT program code that is currently executing,” explained Prvulovic. “However, detection of malware is a much more difficult problem. Profiling is about identifying which part of the program is the best match for the signal, whereas malware detection is about detecting, with sufficient confidence, that the signal does not match any part of the original program, even when the malware is designed to resemble the original code of the application.”</p><p>Zajic and Prvulovic have been studying a wide range of devices to determine the emissions produced.</p><p>“We have more than one source on a circuit board, so we have been trying to localize the sources so we can build an antenna to give us the best possible signal,” said Zajic. “There are multiple places on the board where you connect to the same information, though it may be modulated at different frequencies.”</p><p>Ultimately, researchers expect the project – dubbed Computational Activity Monitoring by Externally Leveraging Involuntary Analog Signals (CAMELIA) – to be capable of monitoring several IoT devices simultaneously. That will require development of advanced processing techniques able to differentiate signals from each device, and new antennas able to pick up the signals from a greater distance.</p><p>CAMELIA is part of a DARPA program called Leveraging the Analog Domain for Security (LADS), which is investing in six different initiatives to address IoT security. The Georgia Tech-Northrop Grumman project is the only one of the projects led by an academic institution.</p><p><em>The research is supported by the DARPA LADS program under contract FA8650-16-C-7620. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the sponsoring agency.</em></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Ben Brumfield (404-385-1933) (<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a>).</p><p><strong>Writer:</strong> John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1469992756</created>  <gmt_created>2016-07-31 19:19:16</gmt_created>  <changed>1475896932</changed>  <gmt_changed>2016-10-08 03:22:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[DARPA awards $9.4 million to develop a new technique for monitoring IoT devices.]]></teaser>  <type>news</type>  <sentence><![CDATA[DARPA awards $9.4 million to develop a new technique for monitoring IoT devices.]]></sentence>  <summary><![CDATA[<p>A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.</p>]]></summary>  <dateline>2016-08-01T00:00:00-04:00</dateline>  <iso_dateline>2016-08-01T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-08-01 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>556881</item>          <item>556891</item>          <item>556901</item>          <item>556911</item>          <item>556921</item>      </media>  <hg_media>          <item>          <nid>556881</nid>          <type>image</type>          <title><![CDATA[Measuring side-channel emissions]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel15.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel15.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel15.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel15.jpg?itok=PvVbaSpl]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Measuring side-channel emissions]]></image_alt>                    <created>1470006053</created>          <gmt_created>2016-07-31 23:00:53</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556891</nid>          <type>image</type>          <title><![CDATA[Measuring side-channel emissions2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel18.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel18.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel18.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel18.jpg?itok=MJ8OSXn0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Measuring side-channel emissions2]]></image_alt>                    <created>1470006138</created>          <gmt_created>2016-07-31 23:02:18</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556901</nid>          <type>image</type>          <title><![CDATA[Systematic side-channel measurement]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel12.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel12.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel12.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel12.jpg?itok=n9P1uLRH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Systematic side-channel measurement]]></image_alt>                    <created>1470006254</created>          <gmt_created>2016-07-31 23:04:14</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556911</nid>          <type>image</type>          <title><![CDATA[Signal outputs from electronic devices]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel13.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel13.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel13.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel13.jpg?itok=8uAHcmUV]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Signal outputs from electronic devices]]></image_alt>                    <created>1470006358</created>          <gmt_created>2016-07-31 23:05:58</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556921</nid>          <type>image</type>          <title><![CDATA[Studying side-channel signals]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel1.jpg?itok=F4SHLmFZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Studying side-channel signals]]></image_alt>                    <created>1470006479</created>          <gmt_created>2016-07-31 23:07:59</gmt_created>          <changed>1475895358</changed>          <gmt_changed>2016-10-08 02:55:58</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="11173"><![CDATA[Alenka Zajic]]></keyword>          <keyword tid="64421"><![CDATA[Internet-of-Things]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="172220"><![CDATA[malicious]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="168627"><![CDATA[side-channel]]></keyword>          <keyword tid="169696"><![CDATA[side-channel signal]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="546651">  <title><![CDATA[Standardizing Communications for the Internet of Things]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The fast-growing Internet of Things (IoT) consists of millions of sensing devices in buildings, vehicles and elsewhere that deliver reams of data online. Yet this far-flung phenomenon involves so many different kinds of data, sources and communication modes that its myriad information streams can be onerous to acquire and process.</p><p>Researchers at the Georgia Tech Research Institute (GTRI) have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks. Known as FUSE, it provides a framework to standardize the diverse IoT world. Its application programming interface (API) lets users capture, store, annotate and transform any data coming from Internet-connected sources.</p><p>“The Internet of Things has always been something of a Tower of Babel, because it gathers data from everywhere – from the latest smart-building microcontrollers and driver-assist vehicles to legacy sensors installed for years,” said Heyward Adams, a GTRI research scientist who is leading the FUSE project. “Traditionally, people wanting to utilize IoT information have had to examine the attributes of each individual sensor and then write custom software on an ad-hoc basis to handle it.”</p><p>Before FUSE, Adams said, a typical IoT task could require several manual steps. For example, users would acquire data from the Internet by manually finding and setting up the proper communication protocols. Then each data value would have to be assigned to a supporting database. Finally, the user would need to process the data, via approaches such as arithmetic manipulation or statistical evaluation, before it could be fed into a decision algorithm.</p><p>“FUSE lets us take a task that used to involve a week or two, and complete it in 10 or 15 minutes,” he said. “It provides a standard way of communicating in the unstandardized world of IoT.”</p><p>Adams explained that the technical challenges in creating an Internet of Things framework include not just receiving and transmitting sensor data that use different communication protocols and modalities, but also digesting and processing a variety of data encodings and formats. One particular challenge involves dealing with timing differences between incoming data sources.</p><p>To build their framework, the GTRI team developed advanced algorithms for handling the many different source types, communication modes and data types coming in over the internet. They also devised methods for managing interactions among data sources that use varying and unpredictable data rates.</p><p>The result was FUSE, with capabilities that include:</p><ul><li>Providing users with online forms that let them define the sources they need in the form of “domains” – abstract descriptions of how the targeted data interrelate;</li><li>Gathering incoming raw data according to user specifications and mapping them into the specified domains. The data can then be transformed and manipulated using “tasks,” which are user-defined JavaScript functions or legacy software that run inside the FUSE service;</li><li>Displaying the processed data to users on-screen via an interactive data visualization, exploration and analysis dashboard that supports most data types including numeric, logical, and text data. Users can also devise their own custom dashboards or other interfaces.</li></ul><p>FUSE makes extensive use of the generic representational state transfer (REST) data capability. Referred to as RESTful, this widely used Internet standard supports the framework’s ability to receive and transmit divergent data streams.</p><p>The FUSE framework is designed to be massively distributable. Using load-balancing techniques, the service can spread IOT workloads across entire computer clusters. Moreover, FUSE can also operate on small and inexpensive microcontrollers of the type increasingly found in buildings and vehicles performing a variety of smart sensing tasks.</p><p>The development team has built a transform layer into FUSE that allows the framework to connect to legacy sensors, allowing integration of older devices that utilize diverse hardware and software designs. FUSE currently employs the open-source MongoDB program as its storage database, but GTRI researchers are developing adapters that let the service plug into common databases such as Oracle, MySQL and Microsoft SQL.</p><p>“One of the advantages of FUSE is that it can be broken up and distributed to accommodate any sensor and server architecture,” Adams said. “So it can grow and change as a business, facility or campus changes over time.”</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986) or Ben Brumfield (<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a>) (404-385-1933).</p><p><strong>Writer</strong>: Rick Robinson</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1466528426</created>  <gmt_created>2016-06-21 17:00:26</gmt_created>  <changed>1475896917</changed>  <gmt_changed>2016-10-08 03:21:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things.]]></sentence>  <summary><![CDATA[<p>Researchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things. Their FUSE software provides a framework to standardize the diverse IoT world. Its application programming interface (API) lets users capture, store, annotate and transform any data coming from Internet-connected sources.</p>]]></summary>  <dateline>2016-06-22T00:00:00-04:00</dateline>  <iso_dateline>2016-06-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-06-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>546611</item>          <item>546621</item>      </media>  <hg_media>          <item>          <nid>546611</nid>          <type>image</type>          <title><![CDATA[FUSE and the Internet of Things]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fuse-4597.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fuse-4597.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fuse-4597.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fuse-4597.jpg?itok=Zgx7YGBY]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[FUSE and the Internet of Things]]></image_alt>                    <created>1466542800</created>          <gmt_created>2016-06-21 21:00:00</gmt_created>          <changed>1475895338</changed>          <gmt_changed>2016-10-08 02:55:38</gmt_changed>      </item>          <item>          <nid>546621</nid>          <type>image</type>          <title><![CDATA[FUSE and the Internet of Things2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fuse-4604.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fuse-4604.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fuse-4604.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fuse-4604.jpg?itok=3q-3hcUz]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[FUSE and the Internet of Things2]]></image_alt>                    <created>1466542800</created>          <gmt_created>2016-06-21 21:00:00</gmt_created>          <changed>1475895338</changed>          <gmt_changed>2016-10-08 02:55:38</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="172147"><![CDATA[API]]></keyword>          <keyword tid="438"><![CDATA[data]]></keyword>          <keyword tid="172148"><![CDATA[data-fusion]]></keyword>          <keyword tid="172149"><![CDATA[Heyward Adams]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="169638"><![CDATA[sensing]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="540301">  <title><![CDATA[VentureLab nanotechnology startup wins TechConnect Innovation Award]]></title>  <uid>28137</uid>  <body><![CDATA[<p>FullScaleNANO, an early-stage company that automates nanomaterial imaging and measurement and a VentureLab portfolio startup, received the&nbsp;TechConnect Innovation Award&nbsp;at the TechConnect World Innovation Conference &amp; Expo May 22-25 in Washington, D.C.</p><p>NanoMet’s technology was developed at Georgia Tech by&nbsp;Chin-Hui Lee, co-founder and a professor in Georgia Tech’s School of Electrical and Computer Engineering. The company also joined VentureLab, the incubator at Georgia Tech for startups created by faculty, students, and staff. VentureLab works with those startups to help them commercialize research into viable companies.</p><p>“We created the algorithms that allow us to process thousands of images, faster and with better overall reliability,” Lee said. “This is a new frontier in science that we hope will lead to faster and more cost-effective innovation for industry.”</p><p>The company is headquartered in Tallahassee, Florida, but its software development team hub is in Atlanta.</p><p>The TechConnect Innovation Awards identify the top 15 percent of submitted technologies. Innovation rankings are based on the potential positive impact of the technology on a specific industry sector. Submissions come from global academic technology transfer offices, early-stage companies, small business innovative research awardees, and government and corporate research laboratories.</p><p>FullScaleNANO won for its NanoMet automated nanomaterials software that measures and characterizes thousands of nanomaterials in seconds.</p><p>“We are honored to receive this award that recognizes our innovative approach to measuring and characterizing nanomaterials, essential particles that are used in today’s product innovations, from medicine to manufacturing,” said Jeffrey Whalen, CEO and co-founder.</p><p>Nanomaterials are tiny particles that can’t be seen with the naked eye. The only way they can be viewed is by taking pictures with an electron microscope that contains a built-in camera. Measuring and characterizing these images is a slow, manual process — done one by one using a ruler — that takes hours, Whalen said.</p><p>NanoMet speeds up the task, using an automated system that processes images in seconds, takes thousands of measurements, and provides objective quality assurance, enabling a shorter time to market. NanoMet “sees” every individual pixel in an electron microscope image to properly identify the exact edges of nanomaterials, providing a repeatable process that saves time and money.</p><p>Nanomaterials are used or being evaluated in a variety of products from batteries to shampoos and in a number of industries from food and medicine to electronics and the environment.</p><p><a href="http://www.understandingnano.com/nanomaterials.html">In medicine alone</a>, applications being developed for nanoparticles include delivery of chemotherapy drugs directly to cancer tumors, resetting the immune system to prevent autoimmune diseases, and delivering drugs to damaged regions of arteries to fight cardiovascular disease. Other industry uses include producing hydrogen from water, reducing the cost of producing fuel cells and solar cells, and cleaning up oil spills, water pollution, and air pollution.</p>]]></body>  <author>Péralte Paul</author>  <status>1</status>  <created>1464259093</created>  <gmt_created>2016-05-26 10:38:13</gmt_created>  <changed>1475896906</changed>  <gmt_changed>2016-10-08 03:21:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Startup's technology was built on Georgia Tech research.]]></teaser>  <type>news</type>  <sentence><![CDATA[Startup's technology was built on Georgia Tech research.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2016-05-26T00:00:00-04:00</dateline>  <iso_dateline>2016-05-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-05-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[peralte.paul@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p class="BasicParagraph">For media inquiries, contact:</p><p>Laura Diamond</p><p>404.894.6016</p><p><a href="mailto:laura.diamond@gatech.edu">laura.diamond@gatech.edu</a></p><p>For inquiries about the&nbsp;School of Electrical and&nbsp;Computer Engineering, contact:</p><p>Jackie Nemeth</p><p><a href="mailto:jackie.nemeth@ece.gatech.edu">jackie.nemeth@ece.gatech.edu</a></p><p>Phone: 404.894.2906</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>540311</item>          <item>540321</item>      </media>  <hg_media>          <item>          <nid>540311</nid>          <type>image</type>          <title><![CDATA[Chin-Hui Lee]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[chl.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/chl.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/chl.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/chl.jpg?itok=OMhUu9X8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chin-Hui Lee]]></image_alt>                    <created>1464706800</created>          <gmt_created>2016-05-31 15:00:00</gmt_created>          <changed>1475895329</changed>          <gmt_changed>2016-10-08 02:55:29</gmt_changed>      </item>          <item>          <nid>540321</nid>          <type>image</type>          <title><![CDATA[Jeffrey Whalen]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[jeffrey_whalen.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/jeffrey_whalen.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/jeffrey_whalen.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/jeffrey_whalen.jpeg?itok=ZCBXyBpR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Jeffrey Whalen]]></image_alt>                    <created>1464706800</created>          <gmt_created>2016-05-31 15:00:00</gmt_created>          <changed>1475895329</changed>          <gmt_changed>2016-10-08 02:55:29</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://fullscalenano.com/]]></url>        <title><![CDATA[FullScaleNANO]]></title>      </link>          <link>        <url><![CDATA[http://venturelab.gatech.edu/]]></url>        <title><![CDATA[GT VentureLab]]></title>      </link>          <link>        <url><![CDATA[http://users.ece.gatech.edu/chl/]]></url>        <title><![CDATA[Chin-Hui Lee]]></title>      </link>          <link>        <url><![CDATA[http://techconnectworld.com/World2016/participate/innovation/awards.html]]></url>        <title><![CDATA[TechConnect Innovation Award]]></title>      </link>          <link>        <url><![CDATA[https://www.ece.gatech.edu/]]></url>        <title><![CDATA[School of Electrical and Computer Engineering]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="149"><![CDATA[Nanotechnology and Nanoscience]]></category>      </categories>  <news_terms>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="149"><![CDATA[Nanotechnology and Nanoscience]]></term>      </news_terms>  <keywords>          <keyword tid="172072"><![CDATA[Chin-Hui Lee]]></keyword>          <keyword tid="172073"><![CDATA[FullScaleNANO]]></keyword>          <keyword tid="107"><![CDATA[Nanotechnology]]></keyword>          <keyword tid="166994"><![CDATA[startups]]></keyword>          <keyword tid="4193"><![CDATA[venturelab]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="537711">  <title><![CDATA[SEISE Tool Uses Semantic Gaps to Detect Website Promotional Attacks]]></title>  <uid>27303</uid>  <body><![CDATA[<p>By detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations. Such attacks use code embedded in highly-ranked sites to drive traffic to sketchy websites selling fake drugs, counterfeit handbags and plagiarized term papers – or installing drive-by malware.</p><p>The new technique, known as Semantic Inconsistency Search (SEISE), uses natural language processing to spot the differences between a compromised site’s expected content and the malicious advertising and promotional code. Using SEISE, the researchers found 11,000 infected sites among non-commercial top-level sponsored .edu, .gov and .mil domains worldwide, and are working to extend the method to other domains.</p><p>The research was supported by the U.S. National Science Foundation and Natural Science Foundation of China. It will be described in a presentation May 25, 2016 at the IEEE Symposium on Security and Privacy in San Jose. SEISE was developed by researchers from the Georgia Institute of Technology, Indiana University and Tsinghua University in China.</p><p>“The basic idea behind promotional infection is to attack websites that are highly-ranked and to leverage their importance to promote various things, most of them illegal,” explained <a href="https://www.ece.gatech.edu/faculty-staff-directory/abdul-r-beyah">Raheem Beyah</a>, who is the Motorola Foundation Professor in Georgia Tech’s <a href="http://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a>. “The bad content is nested into the prominent site to leverage the traffic of that domain. That gives the attackers a doorway to whatever they are promoting.”</p><p>Essentially, said Beyah, the attackers are stealing the site’s good name, even if they don’t install malware or otherwise inflict harm on web visitors.</p><p>“The attackers essentially become part of the prominent website’s brand and share in the ranking they have,” he added. “It’s like setting up operations inside a well-known coffee shop chain. The attacker leverages the brand by becoming co-located with it.”</p><p>The promotional attacks can be difficult to detect, especially if they don’t contain malicious computer code. But the semantic differences between the host site and the attacker’s code can tip off the SEISE algorithm. Once it has characterized the content expected on a website – educational information on an .edu page, for example – the pitches for gambling or inexpensive prescription drugs become obvious.</p><p>“If you are visiting the website for a prestigious university, you don’t expect to see information promoting casino gambling,” said Beyah. “If we expect one thing from the website and see something significantly different, there is a huge semantic gap that we can detect.”</p><p>SEISE doesn’t have to review an entire site to determine what should be there; it can sample the pages to learn context that makes attacker terms stand out. Because their domain purposes are clear and well established, the researchers began with education and government websites. They now hope to extend the automated approach to commercial and other domains whose intended purposes may be less consistent.</p><p>“We are trying to figure out how to get the context right for these domains so we can help companies detect these infections,” Beyah said. “There’s no reason to believe that the commercial domains are any less attractive to attackers than the non-commercial ones.”</p><p>Beyah and Georgia Tech Ph.D. student Xiaojing Liao began the work by using Google searches to find sites with known “bad words” denoting illicit products. They then utilized natural language processing to find terms associated with these known bad words, which were then used to train the SEISE before it was sent out to analyze 100,000 domains for the presence of the illicit terms. The approach identified 11,000 infected sites with a false detection rate of just 1.5 percent and coverage of more than 90 percent.</p><p>SEISE found promotional infections on the websites of top U.S. universities and government agencies, though the problem was truly worldwide, with three percent of .edu and .gov sites infected. Of the infected websites noted, 15 percent were in China and six percent were in the United States.</p><p>Sites are infected using proven attack techniques such as SQL injection, URL redirection and phishing to compromise the credentials of users, Beyah said. Though central websites of the organizations may be secure, pages of individual users and units may be more vulnerable – and still provide the prestige of the overall domain.</p><p>Existing techniques for detecting promotional infections rely on examining redirects and following links, or observing how sites change over time. But those techniques aren’t scalable and can’t be automated in the same way as the new semantic gap approach, Beyah said.</p><p>The researchers want to share their technique with the larger security community, and are discussing how best to make the algorithm available. “Our study shows that by effective detection of infected sponsored top-level domains (sTLDs), the bar to promotion infections can be substantially raised,” the authors wrote in their paper.</p><p>About those 11,000 compromised webpages? The researchers are attempting to contact the operators of all 11,000 of them to share the bad news. “We have spent a lot of time contacting those folks and letting them know what we have found,” Beyah said. “We’re still in the process of doing that because there are so many.”</p><p><em>This work was supported by the National Science Foundation through Grants CNS-1223477, CNS-1223495 and CNS-1527141 and by the Natural Science Foundation of China through Grant 61472215. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.</em></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>s: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986) or Ben Brumfield (<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a>) (404-385-1933).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1463663991</created>  <gmt_created>2016-05-19 13:19:51</gmt_created>  <changed>1475896902</changed>  <gmt_changed>2016-10-08 03:21:42</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations.]]></sentence>  <summary><![CDATA[<p>By detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations. Such attacks use code embedded in highly-ranked sites to drive traffic to sketchy websites selling fake drugs, counterfeit handbags and plagiarized term papers – or installing drive-by malware.&nbsp;</p>]]></summary>  <dateline>2016-05-19T00:00:00-04:00</dateline>  <iso_dateline>2016-05-19T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-05-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>537681</item>          <item>537661</item>      </media>  <hg_media>          <item>          <nid>537681</nid>          <type>image</type>          <title><![CDATA[Researchers with code promoting essays]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[promo-infection_3289.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/promo-infection_3289.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/promo-infection_3289.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/promo-infection_3289.jpg?itok=51uNyBK_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers with code promoting essays]]></image_alt>                    <created>1464282000</created>          <gmt_created>2016-05-26 17:00:00</gmt_created>          <changed>1475895324</changed>          <gmt_changed>2016-10-08 02:55:24</gmt_changed>      </item>          <item>          <nid>537661</nid>          <type>image</type>          <title><![CDATA[Map of worldwide promotional infections]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[geolocation.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/geolocation.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/geolocation.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/geolocation.jpg?itok=dzB_x8rp]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Map of worldwide promotional infections]]></image_alt>                    <created>1464282000</created>          <gmt_created>2016-05-26 17:00:00</gmt_created>          <changed>1475895324</changed>          <gmt_changed>2016-10-08 02:55:24</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="170290"><![CDATA[promotional attack]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>          <keyword tid="172044"><![CDATA[SEISE]]></keyword>          <keyword tid="170291"><![CDATA[semantic gap]]></keyword>          <keyword tid="172045"><![CDATA[semantic inconsistency]]></keyword>          <keyword tid="110271"><![CDATA[website]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="538511">  <title><![CDATA[40-Year Math Mystery and Four Generations of Figuring]]></title>  <uid>31759</uid>  <body><![CDATA[<p>This may sound like a familiar kind of riddle: How many brilliant mathematicians does it take to come up with and prove the Kelmans-Seymour Conjecture?</p><p>But the answer is no joke, because arriving at it took mental toil that spanned four decades until this year, when mathematicians at the Georgia Institute of Technology <a href="http://arxiv.org/abs/1511.05020" target="_blank">finally announced a proof</a> <a href="http://arxiv.org/abs/1602.07557" target="_blank">of that conjecture in Graph Theory.</a></p><p>Their research was funded by the National Science Foundation.</p><p>Graph Theory is a field of mathematics that’s instrumental in complex tangles. It helps you make more connecting flights, helps get your GPS unstuck in traffic, and helps manage your Facebook posts.</p><p>Back to the question. How many? Six (at least).</p><p>One made the conjecture. One tried for years to prove it and failed but passed on his insights. One advanced the mathematical basis for 10 more years. One helped that person solve part of the proof. And two more finally helped him complete the rest of the proof.</p><p>Elapsed time: 39 years.</p><p>So, what is the Kelmans-Seymour Conjecture, anyway? Its name comes from Paul Seymour from Princeton University, who came up with the notion in 1977. Then another mathematician named Alexander Kelmans, arrived at the same conjecture in 1979.</p><p>And though the Georgia Tech proof fills some 120 pages of math reasoning, the conjecture itself is only one short sentence:</p><p><em>If a graph G is 5-connected and non-planar, then G has a TK<sub>5</sub>.</em></p><p><strong>The devil called ‘TK<sub>5</sub>’</strong></p><p>You could call a TK<sub>5</sub> the devil in the details. TK<sub>5</sub>s are larger relatives of K<sub>5</sub>, a very simple formation that looks like a 5-point star fenced in by a pentagon. It resembles an occult or Anarchy symbol, and that’s fitting. A TK<sub>5</sub> in a “graph” is guaranteed to thwart any nice, neat “planar” status.</p><p>Graph Theory. Planar. Non-planar. TK<sub>5</sub>. Let’s go to the real world to understand them better.</p><p>“Graph Theory is used, for example, in designing microprocessors and the logic behind computer programs,” said Georgia Tech mathematician Xingxing Yu, who has shepherded the Kelmans-Seymour Conjecture’s proof to completion. “It’s helpful in detailed networks to get quick solutions that are reasonable and require low computational complexity.”</p><p>To picture a graph, draw some cities as points on a whiteboard and lines representing interstate highways connecting them.</p><p>But the resulting drawings are not geometrical figures like squares and trapezoids. Instead, the lines, called “edges,” are like wires connecting points called “vertices.” For a planar graph, there is always some way to draw it so that the lines from point to point do not cross.</p><p>In the real world, a microprocessor is sending electrons from point to point down myriad conductive paths. Get them crossed, and the processor shorts out.</p><p>In such intricate scenarios, optimizing connections is key. Graphs and graph algorithms play a role in modeling them. “You want to get as close to planar as you can in these situations,” Yu said.</p><p>In Graph Theory, wherever K<sub>5</sub> or its sprawling relatives TK<sub>5</sub>s show up, you can forget planar. That’s why it’s important to know where one may be hiding in a very large graph.</p><p><strong>The human connections</strong></p><p>The human connections that led to the proof of the Kelmans-Seymour Conjecture are equally interesting, if less complicated.</p><p>Seymour had a collaborator, <a href="https://www.math.gatech.edu/users/thomas" target="_blank">Robin Thomas, a Regent’s Professor at Georgia Tech</a> who heads a <a href="http://www.aco.gatech.edu/" target="_blank">program that includes a concentration on Graph Theory</a>. His team has a track record of cracking decades-old math problems. One was even more than a century old.</p><p>“I tried moderately hard to prove the Kelmans-Seymour conjecture in the 1990s, but failed,” Thomas said. “Yu is a rare mathematician, and this shows it. I’m delighted that he pushed the proof to completion.”</p><p>Yu, once Thomas’ postdoc and now a professor at the School of Mathematics, picked up on the conjecture many years later.</p><p>“Around 2000, I was working on related concepts and around 2007, I became convinced that I was ready to work on that conjecture,” Yu said. He planned to involve graduate students but waited a year. “I needed to have a clearer plan of how to proceed. Otherwise, it would have been too risky,” Yu said.</p><p>Then he brought in graduate student Jie Ma in 2008, and together they proved the conjecture part of the way.</p><p>Two years later, Yu brought graduate students Yan Wang and Dawei He into the picture. “Wang worked very hard and efficiently full time on the problem,” Yu said. The team delivered the rest of the proof quicker than anticipated and <a href="http://arxiv.org/abs/1511.05020" target="_blank">currently have two</a> <a href="http://arxiv.org/abs/1602.07557" target="_blank">submitted papers</a> and two more in the works.</p><p>In addition to the six mathematicians who made and proved the conjecture, others tried but didn’t complete the proof but left behind useful cues.</p><p>Nearly four decades after Seymour had his idea, the fight for its proof is still not over. Other researchers are now called to tear at it for about two years like an invading mob. Not until they’ve thoroughly failed to destroy it, will the proof officially stand.</p><p>Seymour’s first reaction to news of the proof reflected that reality. “Congratulations! (If it’s true…),” he wrote.</p><p>Graduate student Wang is not terribly worried. “We spent lots and lots of our time trying to wreck it ourselves and couldn’t, so I hope things will be fine,” he said.</p><p>If so, the conjecture will get a new name: Kelmans-Seymour Conjecture Proved by He, Wang and Yu.</p><p>And it will trigger a mathematical chain reaction, automatically confirming a past conjecture, Dirac’s Conjecture Proved by Mader, and also putting within reach proof of another conjecture, Hajos’ Conjecture.</p><p>For Princeton mathematician Seymour, it’s nice to see an intuition he held so strongly is now likely to enter into the realm of proven mathematics.</p><p>“Sometimes you conjecture some pretty thing, and it's just wrong, and the truth is just a mess,” he wrote in an email message. “But sometimes, the pretty thing is also the truth; that that does happen sometimes is basically what keeps math going I suppose. There’s a profound thought.”</p><p><em>The National Science Foundation funded this research under grants DMS-1265564 and AST-1247545. &nbsp;Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.</em></p>]]></body>  <author>Ben Brumfield</author>  <status>1</status>  <created>1463996813</created>  <gmt_created>2016-05-23 09:46:53</gmt_created>  <changed>1475896902</changed>  <gmt_changed>2016-10-08 03:21:42</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[In social media and much computer technology, a field of math called Graph Theory is used to make networks work. Georgia Tech mathematicians have solved a 40-year Graph Theory mystery.]]></teaser>  <type>news</type>  <sentence><![CDATA[In social media and much computer technology, a field of math called Graph Theory is used to make networks work. Georgia Tech mathematicians have solved a 40-year Graph Theory mystery.]]></sentence>  <summary><![CDATA[<p>In 1977, Princeton mathematician Paul Seymour made a conjecture about certain large graphs. Nearly 40 years later, Georgia Tech mathematicians have come up with a proof he was right. The conjecture is 13 words long; the proof covers 120 pages of math reasoning.</p><p>&nbsp;</p>]]></summary>  <dateline>2016-05-25T00:00:00-04:00</dateline>  <iso_dateline>2016-05-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-05-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Proof of Kelmans-Seymour Conjecture in Graph Theory, a math field applicable to social media]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[ben.brumfield@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Research News</strong></p><p><strong>Georgia Institute of Technology</strong></p><p><strong>Media Relations Contacts:</strong>&nbsp;Ben Brumfield,<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a>, 404-660-1408</p><p><strong>Writer:</strong> Ben Brumfield</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>538601</item>      </media>  <hg_media>          <item>          <nid>538601</nid>          <type>image</type>          <title><![CDATA[Yu, Wang, He offer proof for Kelmans-Seymour Conjecture]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[math_group_001.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/math_group_001.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/math_group_001.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/math_group_001.jpg?itok=V96APPbk]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Yu, Wang, He offer proof for Kelmans-Seymour Conjecture]]></image_alt>                    <created>1464703200</created>          <gmt_created>2016-05-31 14:00:00</gmt_created>          <changed>1475895326</changed>          <gmt_changed>2016-10-08 02:55:26</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="2612"><![CDATA[Graph Theory]]></keyword>          <keyword tid="170744"><![CDATA[He]]></keyword>          <keyword tid="172048"><![CDATA[K5]]></keyword>          <keyword tid="169181"><![CDATA[Kelmans-Seymour conjecture]]></keyword>          <keyword tid="256"><![CDATA[math]]></keyword>          <keyword tid="2748"><![CDATA[mathematics]]></keyword>          <keyword tid="172049"><![CDATA[TK5]]></keyword>          <keyword tid="6944"><![CDATA[Wang]]></keyword>          <keyword tid="170745"><![CDATA[Yu]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="535891">  <title><![CDATA[Lower Income Families Less Likely to Use Online Learning Tools]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Parents looking to help their children succeed academically can access free online educational programs, games and services to help them outside the classroom. A plethora of these tools have popped up in recent years in an attempt to close the achievement gap and digital divide between the rich and poor.</p><p>Instead, the gap seems to be getting larger because of these tools, according to a <a href="http://dl.acm.org/citation.cfm?doid=2858036.2858586">new study</a> from the Georgia Institute of Technology.</p><p>Researchers found that low-income parents are less likely to use these extra resources or, when they do, they do so less effectively because of differences in motivation and parenting practices.</p><p>“A key goal for low-income parents is making sure their children stay in school, so often they are more focused on monitoring whether their kids are doing homework and going to class,” said Betsy DiSalvo, an assistant professor in the School of Interactive Computing, who led the study. “Their attention is directed towards school and not what could happen outside the classroom.”</p><p>Higher-income parents are more likely to act as learning brokers or resource providers by searching for opportunities outside of school, whether it be a book, online game or extracurricular activity.</p><p>DiSalvo and a team of researchers interviewed 63 parents across socio-economic groups and conducted an online survey of 997 parents in partnership with ACT, a national education testing services organization.</p><p>The results found that even when low-income parents turn to online resources they face greater challenges.</p><p>“They had lower perceived technical skills when it came to using computers and portable devices and conducting searches online. Even when they could do it, they downplayed their abilities,” DiSalvo said.&nbsp;</p><p>“If we can capture these parents and give them access to these educational resources, we can help them help their children,” DiSalvo said. “These tools are supposed to improve learning for all children, but if they are not being used by lower-income students, they are coming to school at an even greater disadvantage.”</p><p>Lower-income parents also seem to experience greater face-saving concerns.</p><p>“Most parents are worried about saving face when asking for help with parenting. But this study shows it might be worst for low income parents,” DiSalvo said.</p><p>There were also differences between how high-income and lower-income parents use social networks for education. Lower-income parents talk very little online about finding educational tools and instead physically go to the school resources center.</p><p>“Higher-income parents form Google groups, or search parenting blogs and message boards to learn about new tools. They will seek out that one mother who seems connected to everything and always knows what’s going on,” DiSalvo said.&nbsp;</p><p>DiSalvo presented the study this week at the Associate for Computing Machinery’s Conference on Human Factors in Computing Systems, CHI 2016. The results of this study and prior research are being used to develop an online parent portal that will specifically address the needs of lower-income parents.</p><p>“Across the board parents we talked to are passionate about their kids’ education, but even those who are heavily invested are still struggling to help their children,” DiSalvo said. “If we think these online resources are the answer to helping children, we need to design them so that low-income parents will find them and use them.”</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1463043316</created>  <gmt_created>2016-05-12 08:55:16</gmt_created>  <changed>1475896899</changed>  <gmt_changed>2016-10-08 03:21:39</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Low-income parents are less likely to access free online educational resources or, when they do, they do so less effectively because of differences in motivation and parenting practices.]]></teaser>  <type>news</type>  <sentence><![CDATA[Low-income parents are less likely to access free online educational resources or, when they do, they do so less effectively because of differences in motivation and parenting practices.]]></sentence>  <summary><![CDATA[<p>Researchers from Georgia Tech have found that low-income parents are less likely to access free online educational resources or, when they do, they do so less effectively because of differences in motivation and parenting practices. Study results will help create an online parent portal to specifically meet the needs of less-affluent families.&nbsp;</p>]]></summary>  <dateline>2016-05-12T00:00:00-04:00</dateline>  <iso_dateline>2016-05-12T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-05-12 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond</p><p>Media Relations, Institute Communications</p><p>404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>535511</item>      </media>  <hg_media>          <item>          <nid>535511</nid>          <type>image</type>          <title><![CDATA[Betsy DiSalvo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1463058000</created>          <gmt_created>2016-05-12 13:00:00</gmt_created>          <changed>1475895322</changed>          <gmt_changed>2016-10-08 02:55:22</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://dl.acm.org/citation.cfm?doid=2858036.2858586]]></url>        <title><![CDATA[Information Seeking Practices of Parents: Exploring Skills, Face Threats and Social Networks]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="4551"><![CDATA[k12]]></keyword>          <keyword tid="14511"><![CDATA[online learning]]></keyword>          <keyword tid="3944"><![CDATA[parents]]></keyword>          <keyword tid="166848"><![CDATA[School of Interactive Computing]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="527001">  <title><![CDATA[Georgia Tech, Portman Announce Coda in Tech Square]]></title>  <uid>27918</uid>  <body><![CDATA[<p>The Georgia Institute of Technology and Portman gathered Atlanta’s civic and business leaders Wednesday to announce Coda, an unprecedented collaborative building including Georgia Tech’s high performance computing center located in Tech Square. The approximately 750,000-square-foot mixed-use project represents a $375 million investment into the budding innovation district.</p><p>Within the development, 620,000 square feet will be office space designed to enable unparalleled collaboration between research and industry. Georgia Tech will occupy about half the office space. Nearly 40,000 square feet of retail space, including the adaptive reuse of the historic Crum &amp; Forster building, will be accessed by a plaza, which will become a local gathering place and outdoor living room for Tech Square and Midtown Atlanta. The development also includes an approximately 80,000-square-foot data center, which Next Tier HD has been selected to operate.</p><p>“With Georgia Tech as the anchor tenant, the high performance computing center’s interdisciplinary, collaborative environment will enhance Tech Square’s positive impact in Midtown Atlanta, bringing together people in a mixed-use community of innovation, education and intelligent exchange,” said Georgia Tech President G.P. “Bud” Peterson. “In 12 short years, Tech Square has become the Southeast’s premier innovation neighborhood.”</p><p>“The Portman team is honored to bring to life the vision for this mixed-use property at Tech Square, unlike anything else in the southeastern United States,” said Ambrish Baisiwala, CEO of Portman Holdings. “We’re excited to develop Coda – encompassing collaborative office space, co-working and research facilities, a high performance computing center and interactive community space, collectively enhancing the innovation ecosystem created by Georgia Tech and Midtown.”</p><p>Coda represents the next phase of Georgia Tech’s Technology Square – Atlanta's most sought after neighborhood for technology- and science-based companies. The new complex will be programmed around high performance computing modeling, simulation and a sustainable innovation ecosystem that integrates the existing assets of Tech Square with new opportunities in interdisciplinary research, commercialization and sustainability.</p><p><a href="http://www.portmanusa.com/en/">John Portman &amp; Associates</a> is designing the facility in order to achieve the primary goal of bringing research and commercialization together.&nbsp; The design includes the creation of an outdoor urban plaza bordered by retail and a giant interactive media wall, a high performance data center, and two office towers connected by a central collaborative core. This collaborative core will be a gathering nexus uniquely connecting every floor from top to bottom. The design truly represents the next generation of office space and will be a unique landmark for the city of Atlanta.</p><p>“We believe innovation is generated by looking at things in a different way,” explains Pierluca Maffey, vice president of design for John Portman &amp; Associates. “So we are creating spaces that allow brilliant thinkers, creative minds and smart business people to come together, share their points of view and start a process that leads to the next big idea.”</p><p>Tech Square connects the intellectual capital of Georgia Tech with the thriving business community in Midtown Atlanta. &nbsp;It is a magnet for tech startups and university spinoffs. The area has attracted industry innovation centers that include AT&amp;T Mobility, Panasonic Automotive, Southern Company, Delta Air Lines, The Home Depot, Coca-Cola Enterprises, NCR and ThyssenKrupp Elevator Americas. Along with the new NCR world headquarters under development and Tech Square Labs, the eight-block Tech Square campus will soon total 3 million square feet of commercial space and more than $1 billion invested. The mixed-use development will serve as an urban “main street” for the campus and community.&nbsp;Leasable office and retail space will be represented by Portman Holdings’ Travis Garland, assisted by JLL.</p><p>Invest Atlanta has been very supportive of the project, which is anticipated to have an economic impact of $813.8 million as well as significant economic benefits – not only through the creation of 2,100 construction jobs and 2,400 jobs onsite after completion, but also through its impact on innovation in the region.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1461146280</created>  <gmt_created>2016-04-20 09:58:00</gmt_created>  <changed>1475896885</changed>  <gmt_changed>2016-10-08 03:21:25</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The mixed-use building, which will include the high performance computing center, will enhance the innovation neighborhood.]]></teaser>  <type>news</type>  <sentence><![CDATA[The mixed-use building, which will include the high performance computing center, will enhance the innovation neighborhood.]]></sentence>  <summary><![CDATA[<p>Georgia Tech will occupy about half the office space in the new building. The mixed-used building, which will include the high performance computing center, will enhance Tech Square, which has become the Southeast's premier innovation neighborhood.&nbsp;</p>]]></summary>  <dateline>2016-04-20T00:00:00-04:00</dateline>  <iso_dateline>2016-04-20T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-04-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edua]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>527011</item>          <item>527021</item>          <item>527041</item>      </media>  <hg_media>          <item>          <nid>527011</nid>          <type>image</type>          <title><![CDATA[Coda in Tech Square]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[coda1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/coda1_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/coda1_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/coda1_0.jpg?itok=3t_0HvvB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Coda in Tech Square]]></image_alt>                    <created>1461337200</created>          <gmt_created>2016-04-22 15:00:00</gmt_created>          <changed>1475895301</changed>          <gmt_changed>2016-10-08 02:55:01</gmt_changed>      </item>          <item>          <nid>527021</nid>          <type>image</type>          <title><![CDATA[Georgia Tech's Coda]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[coda2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/coda2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/coda2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/coda2_0.jpg?itok=0NLGoNLZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Georgia Tech's Coda]]></image_alt>                    <created>1461337200</created>          <gmt_created>2016-04-22 15:00:00</gmt_created>          <changed>1475895301</changed>          <gmt_changed>2016-10-08 02:55:01</gmt_changed>      </item>          <item>          <nid>527041</nid>          <type>image</type>          <title><![CDATA[Coda -- Georgia Tech's new building in Tech Square]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[coda3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/coda3_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/coda3_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/coda3_0.jpg?itok=pp3s96no]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Coda -- Georgia Tech's new building in Tech Square]]></image_alt>                    <created>1461337200</created>          <gmt_created>2016-04-22 15:00:00</gmt_created>          <changed>1475895301</changed>          <gmt_changed>2016-10-08 02:55:01</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="139"><![CDATA[Business]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="132"><![CDATA[Institute Leadership]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="149"><![CDATA[Nanotechnology and Nanoscience]]></category>      </categories>  <news_terms>          <term tid="139"><![CDATA[Business]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="132"><![CDATA[Institute Leadership]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="149"><![CDATA[Nanotechnology and Nanoscience]]></term>      </news_terms>  <keywords>          <keyword tid="815"><![CDATA[economic development]]></keyword>          <keyword tid="104951"><![CDATA[high performance computing center]]></keyword>          <keyword tid="114971"><![CDATA[HPCC]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="525981">  <title><![CDATA[Innovation Addresses Rising Thermal Challenges in Mobile Devices, Computers and Data Centers]]></title>  <uid>27303</uid>  <body><![CDATA[<p>In the struggle to improve the performance of mobile devices such as smartphones, extending battery life is just one part of the effort.</p><p>System designers must increasingly worry about removing heat, an unwanted byproduct of watching a YouTube video, shooting a selfie, or updating a Facebook page.</p><p>In the same way that physical limits on the size of transistors may throttle the performance growth promised by Moore’s Law (the expectation that computer processing power will double about every two years), the challenge of removing heat from ever-smaller transistors also poses a threat to continued efficiency improvements. The resulting tradeoffs will affect everything that relies on integrated circuits – from mobile phones and tablets all the way up to high-performance computers and data centers the size of football fields.</p><p>At Georgia Tech, researchers are addressing these thermal challenges in broad and bold ways. Their efforts include designing chips that operate with less power, providing new forms of cooling, and optimizing data center operations.</p><p>“The challenges on the small scale are very different from the challenges at the large scale,” said Yogendra Joshi, a professor in Georgia Tech’s George W. Woodruff School of Mechanical Engineering, whose research group studies thermal challenges in a comprehensive way. “Everyone wants more capabilities in the devices they are using, but there are tradeoffs to be made at each level.”</p><p>Read the <a href="http://www.rh.gatech.edu/features/cooler-runnings">complete feature</a> on the Research Horizons website</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1460929649</created>  <gmt_created>2016-04-17 21:47:29</gmt_created>  <changed>1475896881</changed>  <gmt_changed>2016-10-08 03:21:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[At Georgia Tech, researchers are addressing thermal challenges for electronic equipment in broad and bold ways.]]></teaser>  <type>news</type>  <sentence><![CDATA[At Georgia Tech, researchers are addressing thermal challenges for electronic equipment in broad and bold ways.]]></sentence>  <summary><![CDATA[<p>At Georgia Tech, researchers are addressing thermal challenges for electronic equipment in broad and bold ways. Their efforts include designing chips that operate with less power, providing new forms of cooling, and optimizing data center operations.</p>]]></summary>  <dateline>2016-04-17T00:00:00-04:00</dateline>  <iso_dateline>2016-04-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-04-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>526131</item>          <item>526141</item>      </media>  <hg_media>          <item>          <nid>526131</nid>          <type>image</type>          <title><![CDATA[Yogendra Joshi Data Center]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[yogendra-joshi.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/yogendra-joshi_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/yogendra-joshi_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/yogendra-joshi_0.jpg?itok=WXVhWsZa]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Yogendra Joshi Data Center]]></image_alt>                    <created>1461078000</created>          <gmt_created>2016-04-19 15:00:00</gmt_created>          <changed>1475895298</changed>          <gmt_changed>2016-10-08 02:54:58</gmt_changed>      </item>          <item>          <nid>526141</nid>          <type>image</type>          <title><![CDATA[Mobile Cooling]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mobile-cooling.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mobile-cooling_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mobile-cooling_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mobile-cooling_0.jpg?itok=-cDTzHHa]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Mobile Cooling]]></image_alt>                    <created>1461078000</created>          <gmt_created>2016-04-19 15:00:00</gmt_created>          <changed>1475895298</changed>          <gmt_changed>2016-10-08 02:54:58</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="437"><![CDATA[cooling]]></keyword>          <keyword tid="110561"><![CDATA[data centers]]></keyword>          <keyword tid="12739"><![CDATA[mobile devices]]></keyword>          <keyword tid="170133"><![CDATA[thermal control]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="525971">  <title><![CDATA[Researchers Work to Avoid Potholes and Pitfalls on the Road to Autonomous Vehicles]]></title>  <uid>27303</uid>  <body><![CDATA[<p>At a dirt test track near the Georgia Institute of Technology campus, researchers monitor a scale-model autonomous car as it drifts around corners at a blistering eight meters per second – equivalent to 90 miles per hour in a full-size vehicle. Pushing this car to its limits could help make full-size driverless vehicles more stable in risky road conditions.</p><p>This unique one-fifth-scale device is just one of many research efforts aimed at helping the autonomous vehicle revolution happen successfully and safely.</p><p>Self-driving cars are unquestionably coming, guided variously by radar, lidar, motion sensors, cameras, GPS, and plenty of onboard computation. Already, semi-autonomous prototypes are operating under controlled conditions in California, and speculation about future autonomy includes visions of commuters napping through drive-time, high-speed convoys of networked big-rigs, and a huge drop in accidents as robotic vehicles take over from impaired and distracted humans.</p><p>Yet these are only visions, where generalizations rule and few facts are established. At Georgia Tech, research focuses on the elusive but critical details of this phenomenon, as investigators from disciplines as diverse as industrial systems, design, engineering, computing, and psychology are developing a roadmap to robotic vehicles.</p><p>Researchers at Georgia Tech generally agree that a long period of adjustment, including generations of semi-autonomous vehicles, will be needed to reach completely autonomous transport on a large scale. Estimates of the time required vary from a couple of decades to more than half a century.</p><p>“Fully autonomous transport will require absolutely reliable navigation systems, major changes in highway infrastructure, and traffic control that’s synched to the vehicle, plus new fueling, insurance, financing, and manufacturing paradigms,” said Vivek Ghosal, a professor in Georgia Tech’s School of Economics, who studies the automotive industry. “Yes, we have prototypes, but the operationalizing of autonomy is still far away.”</p><p>A four-level model of the vehicular-automation process is now widely accepted. Level one denotes today’s driver-dependent cars; level two involves intelligent cruise and lane control with some automatic braking; level three indicates semi-autonomous vehicles that drive themselves but cede control to a human when conditions demand; and level four means fully autonomous with no driver controls.</p><p>Researchers at Georgia Tech, focusing on the gritty details, have spotlighted a list of complications that include:</p><ul><li>Human-machine interaction issues.</li><li>Costly highway infrastructure changes.</li><li>Unpredictable traffic effects.</li><li>Conflicts between self-driving and human-driven vehicles.</li><li>Guidance system reliability concerns.</li><li>Vehicle ownership, liability, and business model shifts.</li><li>Potential for major changes to the urban landscape.</li></ul><p>This article takes a look at some of the research currently underway at Georgia Tech related to self-driving vehicles.</p><p>Read the <a href="http://www.rh.gatech.edu/features/rolling-robots">complete feature</a> on the Research Horizons website</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1460929371</created>  <gmt_created>2016-04-17 21:42:51</gmt_created>  <changed>1475896881</changed>  <gmt_changed>2016-10-08 03:21:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are focusing on the details of bringing autonomous vehicles to reality.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are focusing on the details of bringing autonomous vehicles to reality.]]></sentence>  <summary><![CDATA[<p>At Georgia Tech, research focuses on the elusive but critical details of bringing autonomous vehicles to reality, as investigators from disciplines as diverse as industrial systems, design, engineering, computing, and psychology are developing a roadmap to robotic vehicles.</p>]]></summary>  <dateline>2016-04-17T00:00:00-04:00</dateline>  <iso_dateline>2016-04-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-04-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>526121</item>          <item>526111</item>      </media>  <hg_media>          <item>          <nid>526121</nid>          <type>image</type>          <title><![CDATA[Autonomous Racing Car]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[autonomous_race.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/autonomous_race_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/autonomous_race_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/autonomous_race_0.jpg?itok=cN4ASRTg]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Autonomous Racing Car]]></image_alt>                    <created>1461078000</created>          <gmt_created>2016-04-19 15:00:00</gmt_created>          <changed>1475895298</changed>          <gmt_changed>2016-10-08 02:54:58</gmt_changed>      </item>          <item>          <nid>526111</nid>          <type>image</type>          <title><![CDATA[Valerie Thomas at Substation]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[valerie-thomas.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/valerie-thomas_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/valerie-thomas_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/valerie-thomas_1.jpg?itok=bYCJdSab]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Valerie Thomas at Substation]]></image_alt>                    <created>1461078000</created>          <gmt_created>2016-04-19 15:00:00</gmt_created>          <changed>1475895298</changed>          <gmt_changed>2016-10-08 02:54:58</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="137"><![CDATA[Architecture]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="137"><![CDATA[Architecture]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="6503"><![CDATA[automation]]></keyword>          <keyword tid="97281"><![CDATA[autonomous vehicles]]></keyword>          <keyword tid="667"><![CDATA[robotics]]></keyword>          <keyword tid="171930"><![CDATA[self-driving]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="509791">  <title><![CDATA[What Going Viral Looked Like 120 Years Ago]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Populist presidential candidate William Jennings Bryan electrified the 1896 Democratic National Convention with a speech in which he called for a new currency standard based on silver rather than gold. Over the next few years, his “Cross of Gold” ideas spread across the country, with thousands upon thousands of newspaper mentions.</p><p>But it took 120 years and a collaboration between Georgia Tech data scientists and University of Georgia historians to see what the spread of that idea had actually looked like. Starting in Chicago, site of the convention, “Cross of Gold” moved to the populous East Coast, then jumped to the West Coast before filling in the less populated areas.</p><p>“Going viral” may have taken longer in the 19th century, but the principle was much the same.</p><p>Researchers tracked Cross of Gold’s spread using <a href="http://www.usnewsmap.com/">U.S. News Map</a>, a database of more than 10 million newspaper pages that is helping researchers see history with spatial information that hadn’t been available before. Using digitized newspaper articles and cutting-edge search technology, the project is helping researchers see the nation’s history in new ways.</p><p>“Every historical development has a spatial component to it, and often one that is central to explaining the ‘how’ and the ‘why,’” noted Claudio Saunt, chair of the Department of History at the University of Georgia. “With this new search engine, we now have the ability to see where newspapers were writing about a subject, and how interest in that subject changed over time. It’s a powerful tool for historians, and one that can shed new light on the past.”</p><p>A free service, the database is available at USNewsMap.com. It is based on data from approximately 10 million pages published in nearly 2,000 U.S. newspapers between 1836 and 1924. The newspapers represent what was happening in nearly 800 U.S. cities. More pages are being added all the time, though some states still have not contributed digital newspaper data and are therefore not represented on the project’s map.</p><p>To create the database behind the search engine, text from the newspaper pages was scanned by universities around the country, and each word indexed, explained Trevor Goodyear, a research scientist in the <a href="http://www.gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI). The application uses Apache Solr database software, a document database that allowed GTRI researchers to efficiently store and index the large volumes of text and associated metadata.</p><p>The processed text exists across eight different servers, some in a data center at Georgia Tech and some in a cloud server provided by Amazon Web Services. When a user types an inquiry into the website, the servers all participate in the search together. The text database is linked to images of the newspaper pages housed at the Library of Congress, so when users find an item of interest, they can see its context on the original newspaper page.</p><p>The innovations, said Goodyear, were to show when each instance of a term appeared in the newspapers and to animate those appearances. Dots on the map show all mentions of the term in all newspapers across each U.S. city, lighter dots indicating multiple mentions. Users of the site can move a slider to see how terms pop up in different cities over time.</p><p>“We’ve placed the data onto a map of the United States that allows users to view how the term moved across the country over time,” he said. “You can navigate through time to see how each term was used in different locations. You really get a sense for how ideas went viral during that time in history.”</p><p>The Library of Congress awards grants to universities across the United States for digitizing historic newspapers. This digitization process involves applying optical character recognition (OCR) techniques to convert the printed words into computerized text. Through imperfections in the newspapers’ preservation and errors in the scanning and translation process, the results can look very different from what was originally published in the newspapers. Information lost in translation includes the distinctions between headlines, article content, author bylines, and newspaper titles. Due to these limitations, the system links users to the full newspaper page on which the search term appears instead of to individual scanned articles.</p><p>Other newspaper databases exist and the Library of Congress newspaper collection is searchable, but no other source shows the spatial component of history in this way, said Saunt, who is the Richard B. Russell Professor in American History. He expects U.S. News Map will be useful to more than historians.</p><p>“With U.S. News Map, it is easy to trace the evolution of a term – to see where it originated and how it spread – something that linguists are deeply interested in,” he said. “Historians will be able to see how news stories moved across the continent, and rose and fell over time.”</p><p>At the University of Georgia, the project began with Saunt and collaborators Stephen Mihm and Steve Berry in the institution’s eHistory.org program, which is affiliated with the Willson Center Digital Humanities Lab. “We brainstormed the idea of building a website to allow the public to visualize searches in the massive Library of Congress digital newspaper database, ‘Chronicling America,’ by showing the results on a map,” Saunt explained.</p><p>The UGA researchers contacted a colleague at Georgia Tech, where data science and data analytics are part of research in GTRI’s Innovative Computing Division. The project demonstrates how data science can extract new knowledge from massive data sets, Goodyear said.</p><p>“We had never worked with large text-based data sets like this before, and it offered an interesting challenge to conventional techniques,” he added. “We had to adjust techniques developed for short text to longer newspaper text.”</p><p>Other search examples:</p><ul><li>The term “miscegenation” appeared in 1864, coined during the presidential election that year. “You can type it into the search box and watch it spread across the continent like a plague,” said Saunt.</li><li>The term “Ghost Dance,” describing the ceremonial dance that Native Americans began performing in the 1870s, appeared sporadically in western newspapers. But after the massacre at Wounded Knee, it was picked up by the press nationally, noted Saunt, who is associate director of the Institute of Native American Studies.&nbsp;</li><li>Georgia Tech appeared in newspapers in 1888 when fire destroyed the Institute’s Old Shop Building. Newspapers reported the fire and the amount of insurance coverage available, Goodyear noted. Georgia Tech began appearing regularly in newspapers once the publication of sports scores became common.</li><li>The database covers much of the Industrial Revolution in the United States. A search turned up more than 207,000 mentions of inventor Thomas Edison, and 64,000 mentions of influential technology company General Electric.</li></ul><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contacts</strong>: Georgia Tech – John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986); University of Georgia – Dave Marr (<a href="mailto:davemarr@uga.edu">davemarr@uga.edu</a>) (706-542-2640) or Alan Flurry (<a href="mailto:aflurry@uga.edu">aflurry@uga.edu</a>) (706-542-3331).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1457298013</created>  <gmt_created>2016-03-06 21:00:13</gmt_created>  <changed>1475896861</changed>  <gmt_changed>2016-10-08 03:21:01</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a database of more than 10 million newspaper pages that is helping researchers see history with spatial information that hadn’t been available before.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a database of more than 10 million newspaper pages that is helping researchers see history with spatial information that hadn’t been available before.]]></sentence>  <summary><![CDATA[<p>Researchers have developed U.S. News Map, a database of more than 10 million newspaper pages that is helping researchers see history with spatial information that hadn’t been available before. Using digitized newspaper articles and cutting-edge search technology, the project is helping researchers see the nation’s history in new ways.</p>]]></summary>  <dateline>2016-03-07T00:00:00-05:00</dateline>  <iso_dateline>2016-03-07T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-03-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>509751</item>          <item>509741</item>          <item>509771</item>          <item>509761</item>      </media>  <hg_media>          <item>          <nid>509751</nid>          <type>image</type>          <title><![CDATA[Demonstrating U.S. News Map]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[news-map2776.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/news-map2776_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/news-map2776_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/news-map2776_0.jpg?itok=JrYR8p4K]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Demonstrating U.S. News Map]]></image_alt>                    <created>1458923537</created>          <gmt_created>2016-03-25 16:32:17</gmt_created>          <changed>1475895270</changed>          <gmt_changed>2016-10-08 02:54:30</gmt_changed>      </item>          <item>          <nid>509741</nid>          <type>image</type>          <title><![CDATA[U.S. News Map]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[us-news-map.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/us-news-map_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/us-news-map_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/us-news-map_0.jpg?itok=H2ekMo5f]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[U.S. News Map]]></image_alt>                    <created>1458923537</created>          <gmt_created>2016-03-25 16:32:17</gmt_created>          <changed>1475895270</changed>          <gmt_changed>2016-10-08 02:54:30</gmt_changed>      </item>          <item>          <nid>509771</nid>          <type>image</type>          <title><![CDATA[U.S. News Map Team]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[us-news-map4.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/us-news-map4_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/us-news-map4_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/us-news-map4_0.jpg?itok=jp77-Vht]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[U.S. News Map Team]]></image_alt>                    <created>1458923537</created>          <gmt_created>2016-03-25 16:32:17</gmt_created>          <changed>1475895273</changed>          <gmt_changed>2016-10-08 02:54:33</gmt_changed>      </item>          <item>          <nid>509761</nid>          <type>image</type>          <title><![CDATA[Demonstrating U.S. News Map2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[trevor-goodyear.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/trevor-goodyear_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/trevor-goodyear_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/trevor-goodyear_0.jpg?itok=uI9xFpnw]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Demonstrating U.S. News Map2]]></image_alt>                    <created>1458923537</created>          <gmt_created>2016-03-25 16:32:17</gmt_created>          <changed>1475895273</changed>          <gmt_changed>2016-10-08 02:54:33</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="171795"><![CDATA[data engineering]]></keyword>          <keyword tid="92811"><![CDATA[data science]]></keyword>          <keyword tid="1542"><![CDATA[database]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="171796"><![CDATA[Trevor Goodyear]]></keyword>          <keyword tid="169997"><![CDATA[U.S. News Map]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="507121">  <title><![CDATA[Device “Fingerprints” Could Help Protect Power Grid, Other Industrial Systems]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Human voices are individually recognizable because they’re generated by the unique components of each person’s voice box, pharynx, esophagus and other physical structures.</p><p>Researchers are using the same principle to identify devices on electrical grid control networks, using their unique electronic “voices” – fingerprints produced by the devices’ individual physical characteristics – to determine which signals are legitimate and which signals might be from attackers. A similar approach could also be used to protect networked industrial control systems in oil and gas refineries, manufacturing facilities, wastewater treatment plants and other critical industrial systems.</p><p>The research, reported February 23 at the Network and Distributed System Security Symposium in San Diego, was supported in part by the National Science Foundation (NSF). While device fingerprinting isn’t a complete solution in itself, the technique could help address the unique security challenges of the electrical grid and other cyber-physical systems. The approach has been successfully tested in two electrical substations.</p><p>“We have developed fingerprinting techniques that work together to protect various operations of the power grid to prevent or minimize spoofing of packets that could be injected to produce false data or false control commands into the system,” said Raheem Beyah, an associate professor in the School of Electrical and Computer Engineering at the Georgia Institute of Technology. “This is the first technique that can passively fingerprint different devices that are part of critical infrastructure networks. We believe it can be used to significantly improve the security of the grid and other networks.”</p><p>The networked systems controlling the U.S. electrical grid and other industrial systems often lack the ability to run modern encryption and authentication systems, and the legacy systems connected to them were never designed for networked security. Because they are distributed around the country, often in remote areas, the systems are also difficult to update using the “patching” techniques common in computer networks. And on the electric grid, keeping the power on is a priority, so security can’t cause delays or shutdowns.</p><p>“The stakes are extremely high, but the systems are very different from home or office computer networks,” said Beyah. “It is critical that we secure these systems against attackers who may introduce false data or issue malicious commands.”</p><p>Beyah, his students, and colleagues in Georgia Tech’s George W. Woodruff School of Mechanical Engineering set out to develop security techniques that take advantage of the unique physical properties of the grid and the consistent type of operations that take place there.</p><p>For instance, control devices used in the power grid produce signals that are distinctive because of their unique physical configurations and compositions. Security devices listening to signals traversing the grid’s control systems can differentiate between these legitimate devices and signals produced by equipment that’s not part of the system.</p><p>Another aspect of the work takes advantage of simple physics. Devices such as circuit breakers and electrical protection systems can be told to open or close remotely, and they then report on the actions they’ve taken. The time required to open a breaker or a valve is determined by the physical properties of the device. If an acknowledgement arrives too soon after the command is issued – less time than it would take for a breaker or valve to open, for instance – the security system could suspect spoofing, Beyah explained.</p><p>To develop the device fingerprints, the researchers, including mechanical engineering assistant professor Jonathan Rogers, have built computer models of utility grid devices to understand how they operate. Information to build the models came from “black box” techniques – watching the information that goes into and out of the system – and “white box” techniques that utilize schematics or physical access to the systems.</p><p>“Device fingerprinting is a unique signature that indicates the identity of a specific device, or device type, or an action associated with that device type,” Beyah explained. “We can use physics and mathematics to analyze and build a model using first principles based on the devices themselves. Schematics and specifications allow us to determine how the devices are actually operating.”</p><p>The researchers have demonstrated the technique on two electrical substations, and plan to continue refining it until it becomes close to 100 percent accurate. Their current technique addresses the protocol used for more than half of the devices on the electrical grid, and future work will include examining application of the method to other protocols.</p><p>Because they also include devices with measurable physical properties, Beyah believes the approach could have broad application to securing industrial control systems used in manufacturing, oil and gas refining, wastewater treatment and other industries. Beyond industrial controls, the principle could also apply to the Internet of Things (IoT), where the devices being controlled have specific signatures related to switching them on and off.</p><p>“All of these IoT devices will be doing physical things, such as turning your air-conditioning on or off,” Beyah said. “There will be a physical action occurring, which is similar to what we have studied with valves and actuators.”</p><p>In addition to those already mentioned, the research included graduate students David Formby, the paper’s first author; Preethi Srinivasan and Andrew Leonard.</p><p><em>This research was supported by the National Science Foundation under grant number 1140230. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.</em></p><p><strong>CITATION</strong>: David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers and Raheem Beyah, “Who’s in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems,” (NDSS 2016).&nbsp;</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>).<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1456679046</created>  <gmt_created>2016-02-28 17:04:06</gmt_created>  <changed>1475896853</changed>  <gmt_changed>2016-10-08 03:20:53</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are using device fingerprints to help secure the electrical grid.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are using device fingerprints to help secure the electrical grid.]]></sentence>  <summary><![CDATA[<p>Researchers are using the unique electronic “voices” produced by devices on the electrical grid to determine which signals are legitimate and which signals might be from attackers.</p>]]></summary>  <dateline>2016-02-29T00:00:00-05:00</dateline>  <iso_dateline>2016-02-29T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>507061</item>          <item>507081</item>          <item>507101</item>      </media>  <hg_media>          <item>          <nid>507061</nid>          <type>image</type>          <title><![CDATA[Utility fingerprinting]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[utility-fingerprinting.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/utility-fingerprinting_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/utility-fingerprinting_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/utility-fingerprinting_1.jpg?itok=qToRKeiG]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Utility fingerprinting]]></image_alt>                    <created>1456765200</created>          <gmt_created>2016-02-29 17:00:00</gmt_created>          <changed>1475895268</changed>          <gmt_changed>2016-10-08 02:54:28</gmt_changed>      </item>          <item>          <nid>507081</nid>          <type>image</type>          <title><![CDATA[Device fingerprinting2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[utility-fingerprinting2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/utility-fingerprinting2_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/utility-fingerprinting2_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/utility-fingerprinting2_1.jpg?itok=NJNqufu0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Device fingerprinting2]]></image_alt>                    <created>1456765200</created>          <gmt_created>2016-02-29 17:00:00</gmt_created>          <changed>1475895268</changed>          <gmt_changed>2016-10-08 02:54:28</gmt_changed>      </item>          <item>          <nid>507101</nid>          <type>image</type>          <title><![CDATA[Device fingerprinting3]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[utility-fingerprinting3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/utility-fingerprinting3_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/utility-fingerprinting3_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/utility-fingerprinting3_1.jpg?itok=JHypfQme]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Device fingerprinting3]]></image_alt>                    <created>1456765200</created>          <gmt_created>2016-02-29 17:00:00</gmt_created>          <changed>1475895268</changed>          <gmt_changed>2016-10-08 02:54:28</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="171775"><![CDATA[device fingerprinting]]></keyword>          <keyword tid="170238"><![CDATA[electric utility]]></keyword>          <keyword tid="436"><![CDATA[electricity]]></keyword>          <keyword tid="145981"><![CDATA[IISP]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="497321">  <title><![CDATA[Six Finalists Competing for InVenture Prize]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Finalists competing for the 2016 InVenture Prize have invented devices to protect firefighters, give children safe drinking water, and teach us how to play “Stairway to Heaven” on guitar.</p><p>Georgia Tech’s InVenture Prize competition is designed to encourage and support undergraduate students’ interest in innovation and entrepreneurship. Once again, more than 500 students signed up for the competition.</p><p>This year’s six finalist teams have invented ways to make our lives safer, healthier, and a bit more fun. The teams are:</p><p><strong>FireHUD</strong>: A display and data monitor that will track and display real-time information to firefighters in hazardous conditions. The goal is to decrease the level of uncertainty firefighters face.</p><p>Inventors: Zachary Braun, computer engineering; and Tyler Sisk, electrical engineering.</p><p><strong>FretWizard</strong>: A virtual guitar teacher for students at varying levels. The inventors designed the site to give people a simpler and more intuitive way to learn how to play songs on the guitar.</p><p>Inventors: Ali Abid, computer science; and Molly Ricks, international affairs.</p><p><strong>RoboGoalie</strong>: An automatic retrieval device that collects a soccer ball and launches it back to the player. Similar to a batting cage, this device gives soccer players the flexibility of practicing alone.</p><p>Inventors (all mechanical engineering majors): Siu Lun Chan, Ming Him Ko, Zhifeng Su, and Timothy Woo.</p><p><strong>TEQ</strong> <strong>Charging</strong>: A power management system for electric vehicle chargers. The technology and design lowers the cost of installing current charge stations and&nbsp;increases efficiency&nbsp;by sequentially charging vehicles.</p><p>Inventors: Dorrier Coleman, computer engineering; Mitchell Kelman, computer science; Joshua Lieberman, mechanical engineering; and Isaac Wittenstein, mechanical engineering.</p><p><strong>TruePani</strong>: A household sanitation solution, consisting of a passive antimicrobial cup and storage water device that kills harmful microbes in drinking water. This invention was designed for children in rural India who are most affected by waterborne illnesses, but it also could be used in underserved communities worldwide.</p><p>Inventors: Samantha Becker, civil engineering; Sarah Lynn Bowen, business administration; Naomi Ergun, business administration; and Shannon Evanchec, environmental engineering.</p><p><strong>Wobble</strong>: A device to test a person’s reactive balance. It works like a mechanical bull in that it spins and tilts. It can be programmed to different levels of difficulty, which makes it useful for determining return-to-play protocols for athletes who have suffered a concussion and also for evaluating the risk of falling for elderly patients.</p><p>Inventors: Hailey Brown, mechanical engineering; Matthew Devlin, biomedical engineering; Ana Gomez del Campo, biomedical engineering; and Garrett Wallace, biomedical engineering.</p><p>The winning team scores $20,000 and the second-place team receives $10,000.</p><p>Both first- and second-place finishers will receive free U.S. patent filings by Georgia Tech’s Office of Technology Licensing and a spot in Georgia Tech’s startup accelerator program, Flashpoint.</p><p>A $5,000 People’s Choice Award will go to the fans’ favorite invention. Voting will be by text messaging during the finale.</p><p>The finale will take place March 16 at the Ferst Center for the Arts. Tickets are free and can be requested <a href="http://inventureprize.gatech.edu/inventure-prize-ticket-request-form">here</a>.</p><p>The event will also be aired live on Georgia Public Broadcasting.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1455022316</created>  <gmt_created>2016-02-09 12:51:56</gmt_created>  <changed>1475896838</changed>  <gmt_changed>2016-10-08 03:20:38</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Winners of the annual Georgia Tech contest will be announced March 16]]></teaser>  <type>news</type>  <sentence><![CDATA[Winners of the annual Georgia Tech contest will be announced March 16]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2016-02-10T00:00:00-05:00</dateline>  <iso_dateline>2016-02-10T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Georgia Tech Media Relations<br />404-894-6016</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>47390</item>          <item>497161</item>          <item>497171</item>          <item>497221</item>          <item>497251</item>          <item>497201</item>          <item>497271</item>      </media>  <hg_media>          <item>          <nid>47390</nid>          <type>image</type>          <title><![CDATA[InVenture Prize Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[tne92353.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/tne92353.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tne92353.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/tne92353.jpg?itok=WhhIn_5z]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[InVenture Prize Logo]]></image_alt>                    <created>1449175107</created>          <gmt_created>2015-12-03 20:38:27</gmt_created>          <changed>1475894442</changed>          <gmt_changed>2016-10-08 02:40:42</gmt_changed>      </item>          <item>          <nid>497161</nid>          <type>image</type>          <title><![CDATA[FireHUD]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[firehud.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/firehud_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/firehud_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/firehud_0.png?itok=_aFrmzaL]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[FireHUD]]></image_alt>                    <created>1455120000</created>          <gmt_created>2016-02-10 16:00:00</gmt_created>          <changed>1475895256</changed>          <gmt_changed>2016-10-08 02:54:16</gmt_changed>      </item>          <item>          <nid>497171</nid>          <type>image</type>          <title><![CDATA[FretWizard]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fretwizard.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fretwizard_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fretwizard_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fretwizard_0.png?itok=dShb2JPL]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[FretWizard]]></image_alt>                    <created>1455120000</created>          <gmt_created>2016-02-10 16:00:00</gmt_created>          <changed>1475895256</changed>          <gmt_changed>2016-10-08 02:54:16</gmt_changed>      </item>          <item>          <nid>497221</nid>          <type>image</type>          <title><![CDATA[RoboGoalie]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[robogoalie.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/robogoalie_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/robogoalie_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/robogoalie_0.jpg?itok=RaCGpcHS]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[RoboGoalie]]></image_alt>                    <created>1455120000</created>          <gmt_created>2016-02-10 16:00:00</gmt_created>          <changed>1475895256</changed>          <gmt_changed>2016-10-08 02:54:16</gmt_changed>      </item>          <item>          <nid>497251</nid>          <type>image</type>          <title><![CDATA[TEQ Charging - InVenture Prize finalist]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[teq_charging_system_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/teq_charging_system_0_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/teq_charging_system_0_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/teq_charging_system_0_0.jpg?itok=hFAN_MmI]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[TEQ Charging - InVenture Prize finalist]]></image_alt>                    <created>1455120000</created>          <gmt_created>2016-02-10 16:00:00</gmt_created>          <changed>1475895256</changed>          <gmt_changed>2016-10-08 02:54:16</gmt_changed>      </item>          <item>          <nid>497201</nid>          <type>image</type>          <title><![CDATA[TruePani]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[purepahni_composite_1.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/purepahni_composite_1.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/purepahni_composite_1.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/purepahni_composite_1.png?itok=Zpv3jBfg]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[TruePani]]></image_alt>                    <created>1455120000</created>          <gmt_created>2016-02-10 16:00:00</gmt_created>          <changed>1475895256</changed>          <gmt_changed>2016-10-08 02:54:16</gmt_changed>      </item>          <item>          <nid>497271</nid>          <type>image</type>          <title><![CDATA[Wobble]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[wolbull_tilt.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/wolbull_tilt.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/wolbull_tilt.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/wolbull_tilt.jpg?itok=p45slkZR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Wobble]]></image_alt>                    <created>1455120000</created>          <gmt_created>2016-02-10 16:00:00</gmt_created>          <changed>1475895256</changed>          <gmt_changed>2016-10-08 02:54:16</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://inventureprize.gatech.edu/]]></url>        <title><![CDATA[The InVenture Prize web site]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="148"><![CDATA[Music and Music Technology]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="148"><![CDATA[Music and Music Technology]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="3472"><![CDATA[entrepreneurship]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="453"><![CDATA[undergraduate research]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39491"><![CDATA[Renewable Bioproducts]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="491961">  <title><![CDATA[Reconfigurable Origami Tubes Could Find Antenna, Microfluidic Uses]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Origami, the ancient art of paper folding, may soon provide a foundation for antennas that can reconfigure themselves to operate at different frequencies, microfluidic devices whose properties can change in operation – and even heating and air-conditioning ductwork that adjusts to demand.</p><p>The applications could result from reconfigurable and reprogrammable origami tubes developed by researchers at three institutions, including the Georgia Institute of Technology. By changing the ways in which the paper is folded, the same tube can have six or more different cross sections. Though the models are now reconfigured by hand, magnetic or electrical actuators could make the changes when the tubes are used in real-world applications.</p><p>The tubes can be folded flat for shipping, and made in a range of sizes from the nanoscale up to architectural scale. By developing the mathematical theory behind the folding, the researchers can design tubes with the exact properties needed for electrical engineers, civil engineers or other users. The tubes employ the Miura-ori pattern, one of many unique patterns used in origami.</p><p>“We have developed a new type of origami tube that is reconfigurable to many different cross sections,” said <a href="http://www.cee.gatech.edu/people/Faculty/6709/overview">Glaucio Paulino</a>, a professor in the Georgia Tech&nbsp;<a href="http://www.cee.gatech.edu/">School of Civil and Environmental Engineering</a>. “We have also developed a mathematical theory that goes along with it that allows us to design the tubes and predict how they can be reconfigured or reprogrammed.</p><p>The research was supported by the National Science Foundation and reported January 27th in the journal <em>Proceedings of the Royal Society A</em>. In addition to Paulino, the research team included Evgueni Filipov, a graduate student at University of Illinois at Urbana-Champaign and University of Tokyo professor Tomohiro Tachi.</p><p>Fabricating the tubes begins by scoring paper in a device that resembles a computer printer. A special type of cutter in the device follows the researchers’ computer program to make cuts partially through the heavy paper by controlling the cutting speed and cutter force. The cuts facilitate folding and gluing the components to make the tubes, which can be folded flat and then expanded.</p><p>The innovation by the research team was to design folds have two options. One fold might create a section of paper that bulges out of the tube, like a mountain range – and alternatively can create a valley in the tube. These variations allow the different configurations to be selected, each producing a slightly different cross section.</p><p>“The cross section of each one is different, the area of the tube is different and the properties of the tube are different,” said Paulino. “The ability to create different cross sections is critical, especially for multi-physics applications such as deployable origami coupled with active or responsive materials.”</p><p>Among the potential applications are reconfigurable tubes that could carry electromagnetic energy and function as antennas. Different folds would allow them to operate at different frequencies, an application with potential military and commercial interest.</p><p>“Your phone has an antenna designed to work at a specific frequency,” explained Paulino. “If you needed the phone to work at a different frequency, right now you would need a different device. With this reconfigurable capability, we could obtain different antenna configurations in the same device with the same origami tube antenna.”</p><p>Other applications could range from tiny microfluidic tubes able to switch liquids, to engineering and architectural-scale applications in ductwork, piping and even structures to provide shade for buildings during hot parts of the year.</p><p>Though they’re made of paper, the origami tubes can be designed to be quite strong and to support heavy loads, while being easily foldable when not in use. In practical applications, the tubes would be made from flexible polymers or other materials.</p><p>Origami structures have been made for a long time, but what Paulino and his collaborators bring to the field is a mathematical understanding and theory that allows them to apply an engineering approach to the development of the new tube configurations.</p><p>“We have a complete mathematical theory that allows us to see how many cross sections each tube would allow,” he said. “The theory is very powerful. We now have the math, the theory and the prototypes to demonstrate the ideas. We can program these polygonal tubes to create almost any shape.”</p><p>In future work, Paulino and his collaborators would like to establish an actuation mechanism to redeploy the tubes when needed. The system could be operated using magnetized structures, or by electronic means.</p><p>“We are working toward coupling these reconfigurable capabilities with a programmable function that would allow us to activate the folds remotely,” he said. “We would be able to switch among the different configurations at will.”</p><p>In September 2015, the same research team reported developing a new “zippered tube” origami configuration that makes paper structures stiff enough to hold weight yet able to fold flat for easy shipping and storage. Their method could be applied to other thin materials, such as plastic or metal, to transform structures ranging from furniture and buildings to microscopic robots.</p><p><em>This research was partially supported by the National Science Foundation (NSF) under grant CMMI-1538830. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Science Foundation.</em></p><p><strong>CITATION</strong>: E.T. Filipov, G.H. Paulino and T. Tachi, “Origami tubes with reconfigurable polygonal cross-sections,” (Proceedings of the Royal Society A, 2016). <a href="http://dx.doi.org/10.1098/rspa.2015.0607">http://dx.doi.org/10.1098/rspa.2015.0607.</a></p><p><br /><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>)<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1453933949</created>  <gmt_created>2016-01-27 22:32:29</gmt_created>  <changed>1475896831</changed>  <gmt_changed>2016-10-08 03:20:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Origami may soon provide a foundation for antennas that can reconfigure themselves to operate at different frequencies.]]></teaser>  <type>news</type>  <sentence><![CDATA[Origami may soon provide a foundation for antennas that can reconfigure themselves to operate at different frequencies.]]></sentence>  <summary><![CDATA[<p>Origami, the ancient art of paper folding, may soon provide a foundation for antennas that can reconfigure themselves to operate at different frequencies, microfluidic devices whose properties can change in operation – and even heating and air-conditioning ductwork that adjusts to demand.</p>]]></summary>  <dateline>2016-01-27T00:00:00-05:00</dateline>  <iso_dateline>2016-01-27T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-01-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>404-894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>491941</item>          <item>492051</item>          <item>492061</item>          <item>491951</item>      </media>  <hg_media>          <item>          <nid>491941</nid>          <type>image</type>          <title><![CDATA[Reconfigurable origami]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[reconfigurable_origami.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/reconfigurable_origami_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/reconfigurable_origami_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/reconfigurable_origami_0.jpg?itok=hGNR6J9Y]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Reconfigurable origami]]></image_alt>                    <created>1454083200</created>          <gmt_created>2016-01-29 16:00:00</gmt_created>          <changed>1475895248</changed>          <gmt_changed>2016-10-08 02:54:08</gmt_changed>      </item>          <item>          <nid>492051</nid>          <type>image</type>          <title><![CDATA[Changing one switch]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fig1_one_switch.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fig1_one_switch_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fig1_one_switch_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fig1_one_switch_0.png?itok=KEpcfCFo]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Changing one switch]]></image_alt>                    <created>1454083200</created>          <gmt_created>2016-01-29 16:00:00</gmt_created>          <changed>1475895248</changed>          <gmt_changed>2016-10-08 02:54:08</gmt_changed>      </item>          <item>          <nid>492061</nid>          <type>image</type>          <title><![CDATA[Local bending in origami tubes]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fig4_local_bending.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fig4_local_bending_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fig4_local_bending_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fig4_local_bending_0.png?itok=QfaFkHWY]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Local bending in origami tubes]]></image_alt>                    <created>1454083200</created>          <gmt_created>2016-01-29 16:00:00</gmt_created>          <changed>1475895248</changed>          <gmt_changed>2016-10-08 02:54:08</gmt_changed>      </item>          <item>          <nid>491951</nid>          <type>image</type>          <title><![CDATA[Kinematics of tubes]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[kinematic_recon.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/kinematic_recon_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/kinematic_recon_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/kinematic_recon_0.png?itok=SUxZkemC]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Kinematics of tubes]]></image_alt>                    <created>1454083200</created>          <gmt_created>2016-01-29 16:00:00</gmt_created>          <changed>1475895248</changed>          <gmt_changed>2016-10-08 02:54:08</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="137"><![CDATA[Architecture]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="137"><![CDATA[Architecture]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="140701"><![CDATA[Glaucio Paulino]]></keyword>          <keyword tid="4332"><![CDATA[origami]]></keyword>          <keyword tid="169854"><![CDATA[origami tubes]]></keyword>          <keyword tid="169856"><![CDATA[reconfigurable origami]]></keyword>      </keywords>  <core_research_areas>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="487441">  <title><![CDATA[Scientists Demonstrate Basics of Nucleic Acid Computing Inside Cells]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Using strands of nucleic acid, scientists have demonstrated basic computing operations inside a living mammalian cell. The research could lead to an artificial sensing system that could control a cell’s behavior in response to such stimuli as the presence of toxins or the development of cancer.</p><p>The research uses DNA strand displacement, a technology that has been widely used outside of cells for the design of molecular circuits, motors and sensors. Researchers modified the process to provide both “AND” and “OR” logic gates able to operate inside the living cells and interact with native messenger RNA (mRNA).</p><p>The tools they developed could provide a foundation for bio-computers able to sense, analyze and modulate molecular information at the cellular level. Supported by the Defense Advanced Research Projects Agency (DARPA) and the National Science Foundation (NSF), the research was reported December 21 in the journal <em>Nature Nanotechnology</em>.</p><p>“The whole idea is to be able to take the logic that is used in computers and port that logic into cells themselves,” said <a href="https://www.bme.gatech.edu/bme/faculty/Philip-Santangelo">Philip Santangelo</a>, an associate professor in the <a href="https://www.bme.gatech.edu/">Wallace H. Coulter Department of Biomedical Engineering at Georgia Tech and Emory University</a>. “These devices could sense an aberrant RNA, for instance, and then shut down cellular translation or induce cell death.”</p><p>Strand displacement reactions are the biological equivalent of the switches or gates that form the foundation for silicon-based computing. They can be programmed to turn on or off in response to an external stimuli such as a molecule. An “AND” gate, for example, would switch when both conditions were met, while an “OR” gate would switch when either condition was met.</p><p>In the switches the researchers used, a fluorophore reporter molecule and its complementary quenching molecule were placed side-by-side to create an “off” mode. Binding of RNA in one of the strands then displaced a portion of nucleic acid, separating the molecules and allowing generation of a signal that created an “on” mode. Two “on” modes on adjacent nucleic acid strands created an “AND” gate.</p><p>“Demonstrating individual logic gates is only a first step,” said Georg Seelig, assistant professor of computer science and engineering and electrical engineering at the University of Washington. “In the longer term, we want to expand this technology to create circuits with many inputs, such as those we have constructed in cell-free settings.”</p><p>The researchers used ligands designed to bind to specific portions of the nucleic acid strands, which can be created as desired and produced by commercial suppliers.</p><p>“We sensed molecules and showed that we could respond to them,” said Santangelo. “We showed that we could utilize native molecules in the cell as part of the circuit, though we haven’t been able to control a cell yet.”</p><p>Getting basic computing operations to function inside cells was no easy task, and the research required a number of years to accomplish. Among the challenges were getting the devices into the cells without triggering the switches, providing operation rapid enough to be useful, and not killing the human cell lines that researchers used in the lab.</p><p>“We had to chemically change the probes to get them to work inside the cell and to make them stable enough inside the cells,” said Santangelo. “We found that these strand displacement reactions can be slow within the cytosol, so to get them to work faster, we built scaffolding onto the messenger RNA that allowed us to amplify the effects.”</p><p>The nucleic acid computers ultimately operated as desired, and the next step is to use their switching to trigger the production of signaling chemicals that would prompt the desired reaction from the cells. Cellular activity is normally controlled by the production of proteins, so the nucleic acid switches will have to be given the ability to produce enough signaling molecules to induce a change.</p><p>“We need to generate enough of whatever final signal is needed to get the cell to react,” Santangelo explained. “There are amplification methods used in strand displacement technology, but none of them have been used so far in living cells.”</p><p>Even without that final step, the researchers feel they’ve built a foundation that can be used to attain the goal.</p><p>“We were able to design some of the basic logical constructs that could be used as building blocks for future work,” Santangelo said. “We know the concentrations of chemicals and the design requirements for individual components, so we can now start putting together a more complicated set of circuits and components.”</p><p>Cells, of course, already know how to sense toxic molecules and the development malignant tendencies, and to then take action. But those safeguards can be turned off by viruses or cancer cells that know how to circumvent natural cellular processes.</p><p>“Our mechanism would just give cells a hand at doing this,” Santangelo said. “The idea is to add to the existing machinery to give the cells enhanced capabilities.”</p><p>Applying an engineering approach to the biological world sets this example apart from other efforts to control cellular machinery.</p><p>“What makes DNA strand displacement circuits unique is that all components are fully rationally designed at the level of the DNA sequence,” said Seelig. “This really makes this technology ideal for an engineering approach. In contrast, many other approaches to controlling the cellular machinery rely on components that are borrowed from biology and are not fully understood.”</p><p>Beyond those already mentioned, the research team included Benjamin Groves, Yuan-Jyue Chen and Sergii Pochekailov from the University of Washington and Chiara Zurla and Jonathan Kirschman from Georgia Tech and Emory University.</p><p><em>This material is based on work supported by the Defense Advanced Research Projects Agency (DARPA) under contract W911NF-11-2-0068 and by National Science Foundation CAREER award 1253691. The content is solely the responsibility of the authors and does not necessarily represent the official views of DARPA or the NSF.</em></p><p><strong>CITATION</strong>: Benjamin Groves, et al., “Computing in mammalian cells with nucleic acid strand exchange,” (Nature Nanotechnology, 2015). <a href="http://dx.doi.org/10.1038/nnano.2015.278">http://dx.doi.org/10.1038/nnano.2015.278</a></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (<a href="mailto:joon@gatech.edu">joon@gatech.edu</a>).<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1453120327</created>  <gmt_created>2016-01-18 12:32:07</gmt_created>  <changed>1475896824</changed>  <gmt_changed>2016-10-08 03:20:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Using strands of nucleic acid, scientists have demonstrated basic computing operations inside a living mammalian cell.]]></teaser>  <type>news</type>  <sentence><![CDATA[Using strands of nucleic acid, scientists have demonstrated basic computing operations inside a living mammalian cell.]]></sentence>  <summary><![CDATA[<p>Using strands of nucleic acid, scientists have demonstrated basic computing operations inside a living mammalian cell. The research could lead to an artificial sensing system that could control a cell’s behavior in response to such stimuli as the presence of toxins or the development of cancer.</p>]]></summary>  <dateline>2016-01-19T00:00:00-05:00</dateline>  <iso_dateline>2016-01-19T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-01-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>487431</item>          <item>487411</item>      </media>  <hg_media>          <item>          <nid>487431</nid>          <type>image</type>          <title><![CDATA[Studying gate in nucleic acid computing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[and-gate.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/and-gate_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/and-gate_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/and-gate_0.jpg?itok=pAd6zFVh]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Studying gate in nucleic acid computing]]></image_alt>                    <created>1453233601</created>          <gmt_created>2016-01-19 20:00:01</gmt_created>          <changed>1475895242</changed>          <gmt_changed>2016-10-08 02:54:02</gmt_changed>      </item>          <item>          <nid>487411</nid>          <type>image</type>          <title><![CDATA[Studying nucleic acid computing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[nucleic-acid-003.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/nucleic-acid-003_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/nucleic-acid-003_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/nucleic-acid-003_1.jpg?itok=hGXbWreN]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Studying nucleic acid computing]]></image_alt>                    <created>1453233601</created>          <gmt_created>2016-01-19 20:00:01</gmt_created>          <changed>1475895242</changed>          <gmt_changed>2016-10-08 02:54:02</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="140"><![CDATA[Cancer Research]]></category>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="140"><![CDATA[Cancer Research]]></term>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="169826"><![CDATA[DNA strand displacement]]></keyword>          <keyword tid="171582"><![CDATA[molecular circuits]]></keyword>          <keyword tid="169827"><![CDATA[nucleic acid]]></keyword>          <keyword tid="169828"><![CDATA[nucleic acid computing]]></keyword>          <keyword tid="13850"><![CDATA[Philip Santangelo]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="479491">  <title><![CDATA[International Telecommunication Union, Georgia Tech execute agreement to cooperate on Internet of Things standards, applications]]></title>  <uid>28797</uid>  <body><![CDATA[<p>The International Telecommunication Union (ITU) and the Georgia Institute of Technology (Georgia Tech) have executed an agreement to monitor global Internet of Things (IoT) activities and collaborate on developing standards.</p><p>The memorandum of understanding recognizes the importance of standards and the effective management of the associated applications through which value is clearly identified and captured for this fast-growing industry.</p><p>“ITU welcomes the participation of academic institutions like Georgia Tech in creating an enabling environment for leading-edge technologies,” said ITU Secretary-General Houlin Zhao. “This agreement is an important step as we address the coming age of the Internet of Things.”</p><p>“The Internet of Things includes a wide array of disciplines and technologies in which Georgia Tech has a proven track record of expertise,” said G.P. “Bud” Peterson, president of the Georgia Institute of Technology. “Our cutting-edge work in sensors, signal processing, cybersecurity, autonomous systems and computer applications spans a number of the academic programs as well as the applied research enterprise here at Georgia Tech, and we are looking forward to partnering with ITU to develop solutions to this global challenge.”</p><p>This initiative will be carried out in collaboration with the ITU Standardization Sector (ITU-T) Study Group 20, which addresses IoT technologies and its applications, including smart cities and communities, machine-to-machine communications and ubiquitous sensor networks. The Group is charged with developing standards that leverage IoT technologies to address urban-development challenges.</p><p>The Georgia Tech interface will be the Georgia Tech Center for the Development and Application of Internet of Things Technologies (CDAIT), an IoT technological think tank aimed at identifying, understanding and solving challenges within the IoT value chain.</p><p>Areas of cooperation between ITU and CDAIT include:<br />• Joint steering committee. The ITU Standardization Sector (ITU-T) and Georgia Tech will establish a Joint Steering Committee composed of two representatives from each organization that will supervise the overall implementation of the collaboration. <br />• Thought leadership. Both parties will encourage standards groups and trade associations focused on a specific industry (“vertical market”) or a group of industries (“horizontal market”), open source communities, de facto standard representatives, and other public and private organizations interested in IoT technologies to participate in IoT-relevant discussions with the goal of promoting interoperability in the IoT arena across industry and geographic markets. <br />• Global IoT events. Through this cooperation, both ITU and Georgia Tech plan to jointly organize topic-relevant events in the future — such as but not limited to workshops, conferences and webinars — for the purpose of enriching the debate regarding standards-development activities in the technical areas pertinent to IoT. <br />• IoT standardization, research and education. A critical objective of this agreement is the expectation that the collaboration will be of particular relevance to the standardization work of certain ITU-T Study Groups.</p><p>About ITU<br />ITU is the leading United Nations agency for information and communication technologies, driving innovation in ICTs together with 193 member states and a membership of more than 700 private sector entities and academic institutions. Established in 1865, ITU celebrates its 150th anniversary in 2015 as the intergovernmental body responsible for coordinating the shared global use of the radio spectrum, promoting international cooperation in assigning satellite orbits, improving communication infrastructure in the developing world and establishing the worldwide standards that foster seamless interconnection of a vast range of communications systems. From broadband networks to cutting-edge wireless technologies, aeronautical and maritime navigation, radio astronomy, oceanographic and satellite-based earth monitoring as well as converging fixed-mobile phone, Internet and broadcasting technologies, ITU is committed to connecting the world. <a href="http://www.itu.int" title="www.itu.int">www.itu.int</a></p><p>About CDAIT<br />Housed at the Georgia Institute of Technology in the Georgia Tech Research Institute, the Centre for the Development and Application of Internet-of-Things Technologies (CDAIT pronounced sedate) is a global, non-profit, partner-funded center located in Atlanta, Georgia, United States, that fosters interdisciplinary research and education while driving general awareness about the Internet of Things. CDAIT bridges sponsors with Georgia Tech faculty and researchers as well as industry members with similar interests. Founding members include AirWatch by VMware, AT&amp;T, Cisco, Flex, IBM, Samsung, Stanley Black &amp; Decker and Wipro. Learn more about CDAIT at <a href="http://www.cdait.gatech.edu" title="www.cdait.gatech.edu">www.cdait.gatech.edu</a>.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1450259382</created>  <gmt_created>2015-12-16 09:49:42</gmt_created>  <changed>1475896816</changed>  <gmt_changed>2016-10-08 03:20:16</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The International Telecommunication Union (ITU) and the Georgia Institute of Technology (Georgia Tech) have executed an agreement to monitor global Internet of Things (IoT) activities and collaborate on developing standards.]]></teaser>  <type>news</type>  <sentence><![CDATA[The International Telecommunication Union (ITU) and the Georgia Institute of Technology (Georgia Tech) have executed an agreement to monitor global Internet of Things (IoT) activities and collaborate on developing standards.]]></sentence>  <summary><![CDATA[<p>The International Telecommunication Union (ITU) and the Georgia Institute of Technology (Georgia Tech) have executed an agreement to monitor global Internet of Things (IoT) activities and collaborate on developing standards.</p>]]></summary>  <dateline>2015-12-16T00:00:00-05:00</dateline>  <iso_dateline>2015-12-16T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-12-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Collaboration will address fast growing high-tech IoT industry]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>      </media>  <hg_media>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.itu.int/]]></url>        <title><![CDATA[International Telecommunication Union]]></title>      </link>          <link>        <url><![CDATA[http://www.cdait.gatech.edu/]]></url>        <title><![CDATA[Center for the Development and Application of Internet-of-Things Technologies]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="171545"><![CDATA[Connected Living; Internet of Things; CDAIT; Alain Louchez]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="470231">  <title><![CDATA[Large-Scale Modeling Shows Confinement Effects on Cell Macromolecules]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Using large-scale computer modeling, researchers have shown the effects of confinement on macromolecules inside cells – and taken the first steps toward simulating a living cell, a capability that could allow them to ask “what-if” questions impossible to ask in real organisms.</p><p>The work could help scientists better understand signaling between cells, and provide insights for designing new classes of therapeutics. For instance, the simulations showed that particles within the crowded cells tend to linger near cell walls, while confinement in the viscous liquid inside cells causes particles to move about more slowly than they would in unconfined spaces.</p><p>The research is believed to be the first to consider the effects of confinement on intracellular macromolecular dynamics. Supported by the National Science Foundation, the results are reported November 16 in the journal <em>Proceedings of the National Academy of Sciences</em>.</p><p>The study is an interdisciplinary collaboration between <a href="http://www.cc.gatech.edu/~echow/">Edmond Chow</a>, an associate professor in the Georgia Tech <a href="http://www.cse.gatech.edu/">School of Computational Science and Engineering</a>, and <a href="http://www.biology.gatech.edu/people/jeffrey-skolnick">Jeffrey Skolnick</a>, a professor in the Georgia Tech <a href="http://www.biology.gatech.edu/">School of Biology</a>. Their goal is to develop and study models for simulating the motions of molecules inside a cell, and also to develop advanced algorithms and computational techniques for performing large-scale simulations.</p><p>“We are setting the stage for what we need to do to simulate a real cell,” said Skolnick. “We would like to put enough of a real cell together to be able to understand all of the cellular biochemical principles of life. That would allow us to ask questions that we can’t ask now.”</p><p>Earlier simulations, which produced much less fidelity, had assumed that movement within a cell was the same as movement in an unconfined space.</p><p>Skolnick compared the interior of a living cell to a large New Year’s Eve party, perhaps even in Times Square.</p><p>“It’s kind of like a crowded party that has big people and little people, snakes – DNA strands – running around, some really large molecules and some very small molecules,” he said. “It’s a very heterogeneous and dense environment with as much as 40 percent of the volume occupied.”</p><p>The simulations showed that molecules near the cell walls tend to remain there for extended periods of time, just as a newcomer might be pushed toward the walls of the New Year’s Eve party. Motions of nearby particles also tended to be correlated, and those correlations appeared linked to hydrodynamic forces.</p><p>“The lifetimes of these interactions get enhanced, and that is what’s needed there for biological interactions to occur within the cell,” said Skolnick. “This lingering near the wall could be important for understanding other interactions because if there are signaling proteins arriving from other cells, they would associate with those particles first. This could have important consequences for how signals are transduced.”</p><p>For particles in the middle of the cell, however, things are different. These molecules interact primarily with nearby molecules, but they still feel the effects of the cell wall, even if it is relatively far away.</p><p>“Things move more slowly in the middle of the cell than they would if the cell were infinitely big,” Skolnick said. “This may increase the likelihood of having metabolic fluxes because you have to bring molecules around partners. If they are moving slowly, they have more time to react because intimate interactions by accident are unavoidable.”</p><p>While the rate of activity slows quantitatively, qualitatively it is the same kind of motion.</p><p>“Slowed motion is a double-edged sword,” Skolnick explained. “If you happen to be nearby, it is likely that you are going to have interactions if you are slower. But if you are not nearby, being slower makes it difficult to be nearby, affecting potential interactions.”</p><p>The researchers also compared the activities of systems of particles with different sizes, finding that having particles of different sizes didn’t make an appreciable difference in the overall behavior of the molecules.</p><p>While the simulations didn’t include the DNA strands or metabolite particles also found in cells, they did include up to a half-million objects. Using Brownian and Stokesian physics principles, Skolnick and Chow considered what the particles would do within the confined spherical cell a few microns in diameter.</p><p>“From the results of the computer simulations, we can measure things that we think might be interesting, such as the diffusion rates near the walls and away from the walls,” said Chow. “We often don’t know what we are looking for until we find something that forces us to ask more questions and analyze more data.”</p><p>Such simulations take a lot of computational time, so the algorithms used must be efficient enough to be completed in a reasonable time. The “art” of the algorithms is trading off fidelity with processing time. Even though the simulations were very large, they managed to study the actions of the confined particles for no more than milliseconds.</p><p>“Part of the art of this is guessing what will be a reasonable approximation that will mimic the system, but not be so simple to be trivial or too complicated that you can’t take more than a few steps of the simulation,” Chow explained.</p><p>Scientists, of course, can study real cells. But the simulation offers something the real thing can’t do: The ability to turn certain forces on or off to isolate the effects of other processes. For instance, in the simulated cell Skolnick and Chow hope to build, they’ll be able to turn on and off the hydrodynamic forces, allowing them to study the importance of these forces to the functioning of real cells.</p><p>Results from the simulation can suggest hypotheses to be confirmed or rejected by experiment, which can then lead to further questions and simulations.</p><p>“This becomes a tool you can use to understand real cells,” said Chow. “It’s a virtual system, and you can play all the games you want with it.”</p><p><em>This research was supported by the National Science Foundation under grant ACI-1147834. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Science Foundation.</em></p><p><strong>CITATION</strong>: Edmond Chow and Jeffrey Skolnick, “Effects of confinement on models of intracellular macromolecular dynamics,” (Proceedings of the National Academy of Sciences, 2015). <a href="http://www.pnas.org/cgi/doi/10.1073/pnas.1514757112">www.pnas.org/cgi/doi/10.1073/pnas.1514757112</a></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986).<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1447687457</created>  <gmt_created>2015-11-16 15:24:17</gmt_created>  <changed>1475896798</changed>  <gmt_changed>2016-10-08 03:19:58</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have shown the effects of confinement on macromolecules inside simulated cells.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have shown the effects of confinement on macromolecules inside simulated cells.]]></sentence>  <summary><![CDATA[<p>Using large-scale computer modeling, researchers have shown the effects of confinement on macromolecules inside cells – and taken the first steps toward simulating a living cell, a capability that could allow them to ask “what-if” questions impossible to ask in real organisms.&nbsp;</p>]]></summary>  <dateline>2015-11-16T00:00:00-05:00</dateline>  <iso_dateline>2015-11-16T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-11-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>470211</item>          <item>470221</item>      </media>  <hg_media>          <item>          <nid>470211</nid>          <type>image</type>          <title><![CDATA[Cell Visualization1]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cell-simulation-1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cell-simulation-1_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cell-simulation-1_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cell-simulation-1_0.jpg?itok=onX0aUhP]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cell Visualization1]]></image_alt>                    <created>1449257160</created>          <gmt_created>2015-12-04 19:26:00</gmt_created>          <changed>1475895218</changed>          <gmt_changed>2016-10-08 02:53:38</gmt_changed>      </item>          <item>          <nid>470221</nid>          <type>image</type>          <title><![CDATA[Cell Visualization2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cell-simulation-2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cell-simulation-2_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cell-simulation-2_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cell-simulation-2_1.jpg?itok=BX2nvC_S]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cell Visualization2]]></image_alt>                    <created>1449257160</created>          <gmt_created>2015-12-04 19:26:00</gmt_created>          <changed>1475895218</changed>          <gmt_changed>2016-10-08 02:53:38</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="532"><![CDATA[cell]]></keyword>          <keyword tid="148051"><![CDATA[cellular dynamics]]></keyword>          <keyword tid="11171"><![CDATA[Edmond Chow]]></keyword>          <keyword tid="11937"><![CDATA[Jeffrey Skolnick]]></keyword>          <keyword tid="148061"><![CDATA[macromolecules]]></keyword>          <keyword tid="2623"><![CDATA[modeling]]></keyword>          <keyword tid="7257"><![CDATA[visualization]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="455491">  <title><![CDATA[Liquid Cooling Moves onto the Chip for Denser Electronics]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Using microfluidic passages cut directly into the backsides of production field-programmable gate array (FPGA) devices, Georgia Institute of Technology researchers are putting liquid cooling right where it’s needed the most – a few hundred microns away from where the transistors are operating.</p><p>Combined with connection technology that operates through structures in the cooling passages, the new technologies could allow development of denser and more powerful integrated electronic systems that would no longer require heat sinks or cooling fans on top of the integrated circuits. Working with popular 28-nanometer FPGA devices made by Altera Corp., the researchers have demonstrated a monolithically-cooled chip that can operate at temperatures more than 60 percent below those of similar air-cooled chips.</p><p>In addition to more processing power, the lower temperatures can mean longer device life and less current leakage. The cooling comes from simple de-ionized water flowing through microfluidic passages that replace the massive air-cooled heat sinks normally placed on the backs of chips.</p><p>“We believe we have eliminated one of the major barriers to building high-performance systems that are more compact and energy efficient,” said <a href="http://www.ece.gatech.edu/faculty-staff/fac_profiles/bio.php?id=163">Muhannad Bakir</a>, an associate professor and ON Semiconductor Junior Professor in the Georgia Tech <a href="http://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a>. “We have eliminated the heat sink atop the silicon die by moving liquid cooling just a few hundred microns away from the transistors. We believe that reliably integrating microfluidic cooling directly on the silicon will be a disruptive technology for a new generation of electronics.”</p><p>Supported by the Defense Advanced Research Projects Agency (DARPA), the research is believed to be the first example of liquid cooling directly on an operating high-performance CMOS chip. Details of the research were presented on September 28 at the IEEE Custom Integrated Circuits Conference in San Jose, Calif.</p><p>Liquid cooling has been used to address the heat challenges facing computing systems whose power needs have been increasing. However, existing liquid cooling technology removes heat using cold plates externally attached to fully packaged silicon chips – adding thermal resistance and reducing the heat-rejection efficiency.</p><p>To make their liquid cooling system, Bakir and graduate student Thomas Sarvey removed the heat sink and heat-spreading materials from the backs of stock Altera FPGA chips. They then etched cooling passages into the silicon, incorporating silicon cylinders approximately 100 microns in diameter to improve heat transmission into the liquid. A silicon layer was then placed over the flow passages, and ports were attached for the connection of water tubes.</p><p>In multiple tests – including a demonstration for DARPA officials in Arlington, Virginia – a liquid-cooled FPGA was operated using a custom processor architecture provided by Altera. With a water inlet temperature of approximately 20 degrees Celsius and an inlet flow rate of 147 milliliters per minute, the liquid-cooled FPGA operated at a temperature of less than 24 degrees Celsius, compared to an air-cooled device that operated at 60 degrees Celsius.</p><p>Sudhakar Yalamanchili, a professor in the Georgia Tech School of Electrical and Computer Engineering and one of the research group’s collaborators, joined the team for the DARPA demonstration to discuss electrical-thermal co-design.</p><p>“We have created a real electronic platform to evaluate the benefits of liquid cooling versus air cooling,” said Bakir. “This may open the door to stacking multiple chips, potentially multiple FPGA chips or FPGA chips with other chips that are high in power consumption. We are seeing a significant reduction in the temperature of these liquid-cooled chips.”</p><p>The research team chose FPGAs for their test because they provide a platform to test different circuit designs, and because FPGAs are common in many market segments, including defense. However, the same technology could also be used to cool CPUs, GPUs and other devices such as power amplifiers, Bakir said.</p><p>In addition to improving overall cooling, the system could reduce hotspots in circuits by applying cooling much closer to the power source. Eliminating the heat sink could allow more compact packaging of electronic devices – but only if electrical connection issues are also addressed.</p><p>In a separate research project, Bakir’s group has demonstrated the fabrication of copper vias that would run through the silicon columns that are part of the cooling structure fabricated on the FPGAs. Graduate student Hanju Oh, co-advised with College of Engineering Dean Gary May, fabricated high aspect ratio copper vias through the silicon columns, reducing the capacitance of the connections that would carry signals between chips in an array.</p><p>“The moment you start thinking about stacking the chips, you need to have copper vias to connect them,” Bakir said. “By bringing system components closer together, we can reduce interconnect length and that will lead to improvements in bandwidth density and reductions in energy use.”</p><p>The cooling research was funded by DARPA’s Microsystems Technology Office, through the ICECOOL program. At Georgia Tech, DARPA funds two major cooling and system integration projects, one called STAECool directed by George W. Woodruff School of Mechanical Engineering Professor Yogendra Joshi, and the other, called SuperCool, that is directed by Bakir. In collaboration with the STAECool effort, Bakir and Joshi, along with Professors Andrei Fedorov and Suresh Sitaraman from the School of Mechanical Engineering, developed a thermal design vehicle to emulate challenging power maps to test the benefits of microfluidic cooling.</p><p>“We have reached an important milestone that we hope to use as a stepping stone to reach other objectives,” said Bakir. “There is still a big challenge ahead, but we expect this to allow much denser, higher-performance computing systems that will dissipate less power. We can think of many interesting applications for these cooling technologies.”</p><p>Altera’s principal investigator for the project, Arifur Rahman, said: “Future high-performance semiconductor electronics will be increasingly dominated by thermal budget and ability to remove heat. The embedded microfluidic channels provide an intriguing option to remove heat from future microelectronics systems.”</p><p><em>This research was supported by DARPA-MTO; the contents of the news release are the responsibility of the authors and do not necessarily reflect the official position of DARPA.</em></p><p><strong>CITATION</strong>: Thomas E. Sarvey, et al., “Embedded Cooling Technologies for Densely Integrated Electronic Systems,” (IEEE Custom Integrated Circuits Conference, 2015).</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986)<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1444049928</created>  <gmt_created>2015-10-05 12:58:48</gmt_created>  <changed>1475896783</changed>  <gmt_changed>2016-10-08 03:19:43</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are putting liquid cooling right where it’s needed the most – a few hundred microns away from where the transistors are operating.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are putting liquid cooling right where it’s needed the most – a few hundred microns away from where the transistors are operating.]]></sentence>  <summary><![CDATA[<p>Using microfluidic passages cut directly into the backsides of production field-programmable gate array (FPGA) devices, Georgia Institute of Technology researchers are putting liquid cooling right where it’s needed the most – a few hundred microns away from where the transistors are operating.&nbsp;</p>]]></summary>  <dateline>2015-10-05T00:00:00-04:00</dateline>  <iso_dateline>2015-10-05T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-10-05 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>455451</item>          <item>455461</item>          <item>455471</item>          <item>455481</item>      </media>  <hg_media>          <item>          <nid>455451</nid>          <type>image</type>          <title><![CDATA[Liquid cooling ports]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cooling-fpga2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cooling-fpga2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cooling-fpga2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cooling-fpga2_0.jpg?itok=7Xa_6feu]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Liquid cooling ports]]></image_alt>                    <created>1449256319</created>          <gmt_created>2015-12-04 19:11:59</gmt_created>          <changed>1475895199</changed>          <gmt_changed>2016-10-08 02:53:19</gmt_changed>      </item>          <item>          <nid>455461</nid>          <type>image</type>          <title><![CDATA[Research on liquid cooling of chips]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cooling-fpga5.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cooling-fpga5_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cooling-fpga5_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cooling-fpga5_0.jpg?itok=lGhtMXxm]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Research on liquid cooling of chips]]></image_alt>                    <created>1449256319</created>          <gmt_created>2015-12-04 19:11:59</gmt_created>          <changed>1475895199</changed>          <gmt_changed>2016-10-08 02:53:19</gmt_changed>      </item>          <item>          <nid>455471</nid>          <type>image</type>          <title><![CDATA[Liquid cooling ports2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cooling-fpga4.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cooling-fpga4_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cooling-fpga4_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cooling-fpga4_0.jpg?itok=JerZBc8R]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Liquid cooling ports2]]></image_alt>                    <created>1449256334</created>          <gmt_created>2015-12-04 19:12:14</gmt_created>          <changed>1475895199</changed>          <gmt_changed>2016-10-08 02:53:19</gmt_changed>      </item>          <item>          <nid>455481</nid>          <type>image</type>          <title><![CDATA[Research on liquid cooling of chips2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cooling-fpga6.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cooling-fpga6_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cooling-fpga6_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cooling-fpga6_0.jpg?itok=c91eYRlY]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Research on liquid cooling of chips2]]></image_alt>                    <created>1449256334</created>          <gmt_created>2015-12-04 19:12:14</gmt_created>          <changed>1475895199</changed>          <gmt_changed>2016-10-08 02:53:19</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="63151"><![CDATA[chip cooling]]></keyword>          <keyword tid="609"><![CDATA[electronics]]></keyword>          <keyword tid="124871"><![CDATA[FPGA]]></keyword>          <keyword tid="143631"><![CDATA[liquid cooling]]></keyword>          <keyword tid="12427"><![CDATA[microfluidics]]></keyword>          <keyword tid="12093"><![CDATA[Muhannad Bakir]]></keyword>          <keyword tid="167609"><![CDATA[semiconductor]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="446341">  <title><![CDATA[The Heart of Innovation]]></title>  <uid>27828</uid>  <body><![CDATA[<p>Involving Georgia Tech students in developing creative solutions to technology challenges is one of the major reasons why corporations are locating innovation centers in Technology Square. Read the full story in the latest issue of Research Horizons magazine, now online.</p>]]></body>  <author>Melanie Goux</author>  <status>1</status>  <created>1441881791</created>  <gmt_created>2015-09-10 10:43:11</gmt_created>  <changed>1475896773</changed>  <gmt_changed>2016-10-08 03:19:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Read the full story in the latest issue of Research Horizons magazine, now online.]]></teaser>  <type>news</type>  <sentence><![CDATA[Read the full story in the latest issue of Research Horizons magazine, now online.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2015-09-10T00:00:00-04:00</dateline>  <iso_dateline>2015-09-10T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-09-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>446311</item>      </media>  <hg_media>          <item>          <nid>446311</nid>          <type>image</type>          <title><![CDATA[The Heart of Innovation]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[centers_thumbnail.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/centers_thumbnail_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/centers_thumbnail_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/centers_thumbnail_0.png?itok=rzJUcQjt]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[The Heart of Innovation]]></image_alt>                    <created>1449256217</created>          <gmt_created>2015-12-04 19:10:17</gmt_created>          <changed>1475895187</changed>          <gmt_changed>2016-10-08 02:53:07</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.rh.gatech.edu/features/heart-innovation]]></url>        <title><![CDATA[The Heart of Innovation | Research Horizons Magazine]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="68541"><![CDATA[AT&amp;T Foundry]]></keyword>          <keyword tid="1051"><![CDATA[Computer Science]]></keyword>          <keyword tid="4098"><![CDATA[ecosystem]]></keyword>          <keyword tid="341"><![CDATA[innovation]]></keyword>          <keyword tid="49201"><![CDATA[Panasonic]]></keyword>          <keyword tid="2563"><![CDATA[r&amp;d]]></keyword>          <keyword tid="2002"><![CDATA[Tech Square]]></keyword>          <keyword tid="3263"><![CDATA[technology square]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="430701">  <title><![CDATA[Intel, Georgia Tech Partner to Diversify Workforce]]></title>  <uid>27918</uid>  <body><![CDATA[<p>In conjunction with an <a href="https://www.whitehouse.gov/the-press-office/2015/08/04/fact-sheet-president-obama-announces-new-commitments-investors-companies">event at the White House Tuesday</a>, Intel and the Georgia Institute of Technology announced an enhanced partnership to produce a more diverse, qualified workforce for the technology industry. Intel is investing $5 million in Georgia Tech over five years to build a pipeline of underrepresented engineers and computer scientists.</p><p>The Intel Diversity Scholars Program will recruit and retain underrepresented minority students to STEM (science, technology, engineering and mathematics) majors and prepare them for graduate school. The effort is anticipated to benefit about 1,000 students over five years through mentoring, scholarships and professional development workshops.</p><p>Earlier this year, Intel announced a new goal: to achieve full representation of underrepresented minorities and women by the year 2020 in its U.S. workforce, along with a $300 million Diversity in Technology Initiative to help build a workforce pipeline.</p><p>“Filling the tech industry pipeline with diverse students is critical to increasing the number of diverse engineers and computer scientists in the field,” said Rosalind Hudnell, vice president of human resources and chief diversity officer at Intel. “The goal of this program is to inspire and support more women and underrepresented minorities to earn technical degrees so we can hire them down the road – we want to foster those future tech innovators.” &nbsp;</p><p>Georgia Tech is a leading producer of women and minority STEM graduates and graduates nearly 10 percent of all African-American Ph.D. engineers in the nation.</p><p>“It is a national imperative that the U.S. continue to enhance the engagement of students of all backgrounds in STEM fields to create a more robust economy,” said Gary May, dean and Southern Company Chair in the College of Engineering at Georgia Tech. “The higher education and private sectors must combine forces to achieve the impact that is necessary. As a national leader in producing outstanding underrepresented engineering graduates, Georgia Tech is pleased to partner with Intel in this transformative initiative.”</p><p>The gift will expand several Georgia Tech initiatives already underway, including:</p><ul><li><a href="http://ceed.gatech.edu/summer-engineering-institute-sei">Summer Engineering Institute</a>. The three-week Summer Engineering Institute hosts rising 11<sup>th</sup>- and 12<sup>th</sup>-graders from around the country. Students learn basic engineering and computer science techniques and gain hands-on experience through working in teams to solve real-world engineering problems.</li><li><a href="http://ceed.gatech.edu/programs/undergrad/rise">RISE</a>. Retaining Inspirational Scholars in Technology and Engineering (RISE) provides financial support to talented underrepresented minority and non-traditional students. The Intel Diversity Scholars program would provide scholarships, with priority going to those whose majors align with Intel’s interests: electrical engineering, computer science and computer engineering.</li><li><a href="http://ceed.gatech.edu/peer-partner-program-0">Peer-2-Peer Mentoring</a>. This program provides specialized guidance and support to undergraduate students majoring in STEM, while also helping them adjust to the climate and culture at Georgia Tech. Mentors and mentees develop leadership, communication and networking skills.</li><li><a href="http://www.sure.gatech.edu">SURE</a>. Summer Undergraduate Research in Engineering (SURE) is a 10-week research program to attract qualified minority students from across the country into graduate school in the fields of engineering and science. In addition to conducting research, participants receive mentoring from faculty and graduate students and participate in professional development and technical seminars.</li><li><a href="http://focus.gatech.edu">FOCUS</a>. This program invites college juniors and seniors from around the country to attend a three-day event designed to raise awareness of graduate education among underrepresented students. Participants learn about financial resources, visit research laboratories, network with other scholars and receive help with the graduate school application process.</li></ul><p>The Intel and Georgia Tech program was announced in conjunction with the first-ever White House Demo Day, which celebrates the important role entrepreneurship plays in America's economy. Unlike a private-sector Demo Day, where entrepreneurs and startups pitch their ideas to funders, the new event invites innovators from around the country to "demo" their individual stories in Washington, D.C.&nbsp;&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1438677002</created>  <gmt_created>2015-08-04 08:30:02</gmt_created>  <changed>1475896759</changed>  <gmt_changed>2016-10-08 03:19:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Intel announces gift of $5 million to support Georgia Tech efforts to recruit, retain and graduate underrepresented minorities.]]></teaser>  <type>news</type>  <sentence><![CDATA[Intel announces gift of $5 million to support Georgia Tech efforts to recruit, retain and graduate underrepresented minorities.]]></sentence>  <summary><![CDATA[<p>The Intel Diversity Scholars Program at Georgia Tech will recruit and retain underrepresented minority students to STEM (science, technology, engineering and math) majors and prepare them for graduate school. The effort is anticipated to benefit about 1,000 students over five years through mentoring, scholarships and professional development workshops.&nbsp;</p>]]></summary>  <dateline>2015-08-04T00:00:00-04:00</dateline>  <iso_dateline>2015-08-04T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-08-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Georgia Tech Media Relations<br />404-894-6016</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>370171</item>          <item>430721</item>      </media>  <hg_media>          <item>          <nid>370171</nid>          <type>image</type>          <title><![CDATA[Tech Tower]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[15c6001-p6-001.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/15c6001-p6-001.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/15c6001-p6-001.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/15c6001-p6-001.jpg?itok=X8Vr0M8g]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tech Tower]]></image_alt>                    <created>1449245856</created>          <gmt_created>2015-12-04 16:17:36</gmt_created>          <changed>1475894344</changed>          <gmt_changed>2016-10-08 02:39:04</gmt_changed>      </item>          <item>          <nid>430721</nid>          <type>image</type>          <title><![CDATA[Gary May]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[gary_may.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/gary_may.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/gary_may.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/gary_may.jpg?itok=k27KPxfE]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Gary May]]></image_alt>                    <created>1449254381</created>          <gmt_created>2015-12-04 18:39:41</gmt_created>          <changed>1475895169</changed>          <gmt_changed>2016-10-08 02:52:49</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.news.gatech.edu/2015/05/06/georgia-tech-spotlights-african-american-men-stem]]></url>        <title><![CDATA[Georgia Tech Spotlights African-American Men in STEM]]></title>      </link>          <link>        <url><![CDATA[http://www.news.gatech.edu/2014/06/13/georgia-tech-spotlights-women-engineering-washington-dc-media-roundtable]]></url>        <title><![CDATA[Georgia Tech Spotlights Women in Engineering]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="15791"><![CDATA[Pipeline]]></keyword>          <keyword tid="167258"><![CDATA[STEM]]></keyword>          <keyword tid="70481"><![CDATA[underrepresented minorities]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="433011">  <title><![CDATA[International Tech Companies Join New Georgia Tech Internet of Things Research Center]]></title>  <uid>27191</uid>  <body><![CDATA[<p>The recently established Center for the Development and Application of Internet-of-Things Technologies (CDAIT) at the Georgia Institute of Technology announces that AirWatch®, AT&amp;T and Samsung Electronics constitute the inaugural group of founding members. The involvement of these companies reflects their continuing commitment to the advancement of the transformational capabilities of the Internet of Things (IoT).</p><p>“Internet of Things” refers to the ability for all types of devices to communicate with each other through networks like the Internet, radio frequencies and other forms of transmission. Devices could include the equipment in cars, homes, trucks, cargo, health care, and other everyday objects. This new area of technological innovation is receiving increasing attention around the world because of its potential impact on all sectors of the economy and society.</p><p>Together with Georgia Tech and GTRI, the founding members will closely monitor and actively participate in the expansion of the rapidly growing IoT industry. Other leading global companies involved in IoT have indicated their interest in getting engaged with CDAIT.</p><p>“Having companies of this stature join Georgia Tech in this effort speaks volumes about what we’re trying to accomplish,” said Andrew Gerber, Georgia Tech Senior Vice President and Director of the Georgia Tech Research Institute (GTRI). “We are proud to be recognized as a trusted collaborator in the Internet-of-Things arena. We are eager to harness the unique expertise of our professors, researchers and students throughout the Internet-of-Things value chain.”</p><p>For more than a century, AT&amp;T has consistently provided innovative, reliable, high-quality products and services. With more than 120 million wireless customers, AT&amp;T’s mission is to connect people with their world, everywhere they live and work, and do it better than anyone else.</p><p>“We’ve had a long-standing relationship with Georgia Tech for many years as we share a common commitment to pushing the boundaries of innovation and taking education to new levels,” said Chris Penrose, senior vice president, Internet of Things Organization, AT&amp;T Mobility. “The opportunity for IoT is real. It’s already reshaping industries and solving real business issues for companies around the globe. We’ve been a leading participant in the IoT space for nearly eight years and look forward to extending our thought-leadership with innovators in our own backyard.”</p><p>AirWatch® by VMware® is the leading enterprise mobility management provider. With more than a decade in business, AirWatch continues to develop solutions that empower companies to focus on innovative uses of mobile technology rather than dealing with the complexities of managing mobility.</p><p>“AirWatch is a longtime supporter of Georgia Tech innovation, and our support of CDAIT furthers our commitment to collaborate on strategic initiatives,” said John Marshall, senior vice president and general manager, AirWatch. “We see an incredible opportunity for the Internet of Things to redefine enterprise mobility and our daily lives. We look forward to working alongside Georgia Tech on building these transformative technologies of tomorrow.”</p><p>Headquartered in Suwon, South Korea, Samsung Electronics seeks to inspire the world and shape the future with transformative ideas and technologies, redefining the worlds of TVs, smartphones, wearable devices, tablets, cameras, digital appliances, printers, medical equipment, network systems, and semiconductor and LED solutions. Samsung Electronics also leads in the IoT space through, among others, the company’s Smart Home and Digital Health initiatives.</p><p>“Samsung Electronics is looking forward to working closely with the CDAIT’s outstanding members to drive the IoT research areas and core technologies,” said Jin Wook Lee, Vice President of Software R&amp;D Center at Samsung Electronics. “We will support CDAIT in its efforts toward providing in-depth research into the various aspects of IoT technology.”</p><p>Housed at the Georgia Institute of Technology in the Georgia Tech Research Institute, the Center for the Development and Application of Internet-of-Things Technologies (CDAIT pronounced <em>sedate</em>) is a global, non-profit, partner-funded center located in Atlanta, Georgia, United States, that fosters interdisciplinary research and education while driving general awareness about the Internet of Things. It aims at efficiently identifying, understanding and solving for its sponsors challenges and problems that may arise along the whole IoT value chain. CDAIT bridges sponsors with Georgia Tech faculty and researchers as well as industry members with similar interests.</p><p>“Our center will greatly benefit from having a continuous and close dialogue with premier technological companies of the caliber of AirWatch, AT&amp;T and Samsung Electronics,” said Alain Louchez, CDAIT Managing Director. “With their help, we are looking forward to making significant contributions to the IoT industry.”</p><p>Learn more about CDAIT at <a href="http://www.cdait.gatech.edu/">www.cdait.gatech.edu</a>.</p>]]></body>  <author>Robert Nesmith</author>  <status>1</status>  <created>1439228194</created>  <gmt_created>2015-08-10 17:36:34</gmt_created>  <changed>1475896759</changed>  <gmt_changed>2016-10-08 03:19:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[AT&T, Samsung and AirWatch join Center for the Development and Application of Internet-of-Things Technologies.]]></teaser>  <type>news</type>  <sentence><![CDATA[AT&T, Samsung and AirWatch join Center for the Development and Application of Internet-of-Things Technologies.]]></sentence>  <summary><![CDATA[<p>The recently established Center for the Development and Application of Internet-of-Things Technologies (CDAIT) at the Georgia Institute of Technology announces that AirWatch®, AT&amp;T and Samsung Electronics constitute the inaugural group of founding members. The involvement of these companies reflects their continuing commitment to the advancement of the transformational capabilities of the Internet of Things (IoT).</p>]]></summary>  <dateline>2015-08-11T00:00:00-04:00</dateline>  <iso_dateline>2015-08-11T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-08-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[lance.wallace@gtri.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Lance Wallace</strong></p><p>Director of Communications,</p><p>Georgia Tech Research Institute</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>      </media>  <hg_media>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.cdait.gatech.edu/]]></url>        <title><![CDATA[Center for the Development and Application of Internet-of-Things Technologies]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="79601"><![CDATA[Alain Louchez]]></keyword>          <keyword tid="110301"><![CDATA[CDAIT]]></keyword>          <keyword tid="137481"><![CDATA[Center for the Development and Application of Internet-of-Things Technologies]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="424691">  <title><![CDATA[Cybersecurity Summit Aims to Help Small, Mid-size Businesses]]></title>  <uid>27918</uid>  <body><![CDATA[<p>The U.S. Chamber of Commerce, along with the Georgia Institute of Technology and five other groups, held a summit Wednesday to help small and mid-size business owners develop, evaluate, and strengthen cybersecurity programs.</p><p>The <a href="https://www.uschamber.com/event/georgia-2015-cybersecurity-summit">event</a>, held at the GTRI Conference Center, brought together government, law enforcement, and private sector representatives to share information necessary to build or strengthen a cybersecurity program and explore ways to communicate about cybersecurity with small and mid-size supply chain partners.</p><p>“Our vision&nbsp;at Georgia&nbsp;Tech&nbsp;is to integrate academia, government, and industry to aggressively solve threats and transfer results into commercially deployable technologies,” said Steve Cross, executive vice president for Research, who served as a panelist during the event.</p><p>“As home to world-class&nbsp;scientists and engineers who&nbsp;are&nbsp;addressing today's threats, while anticipating and preparing for what's next, we're proud to&nbsp;participate&nbsp;in&nbsp;this very important event,” he added.&nbsp;</p><p>The summit served as the 2015 kick-off event for the <a href="https://www.uschamber.com/programs/national-security-emergency-preparedness/2015-cybersecurity-campaign">U.S. Chamber’s awareness campaign</a>, which aims to advance cybersecurity policies and educate businesses of all sizes about cyber threats and how to protect against them.</p><p>“A few years ago, cyberattacks against the government and corporations were on the margins of news stories, but now, a day doesn’t go by that we don’t hear about a data breach or cyber-intrusion,” said Ann Beauchesne, senior vice president for National Security and Emergency Preparedness at the U.S. Chamber. “Through this summit and our cybersecurity awareness campaign, the Chamber is urging businesses of all sizes to adopt fundamental Internet security practices to reduce network weaknesses and make the price of successful hacking steep.”</p><p>Other summit partners included American Express, AT&amp;T, and Firehost, along with the Georgia Chamber of Commerce and the Technology Association of Georgia.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1436887575</created>  <gmt_created>2015-07-14 15:26:15</gmt_created>  <changed>1475896744</changed>  <gmt_changed>2016-10-08 03:19:04</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[U.S. Chamber of Commerce kicks off its 2015 cybersecurity awareness campaign during event held at GTRI]]></teaser>  <type>news</type>  <sentence><![CDATA[U.S. Chamber of Commerce kicks off its 2015 cybersecurity awareness campaign during event held at GTRI]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2015-07-14T00:00:00-04:00</dateline>  <iso_dateline>2015-07-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-07-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond</p><p>Georgia Institute of Technology</p><p>404-894-6016</p><p>&nbsp;</p><p>Erica Flint</p><p>U.S. Chamber of Commerce</p><p>(202) 463-5682</p><p>&nbsp;</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>365331</item>          <item>413871</item>      </media>  <hg_media>          <item>          <nid>365331</nid>          <type>image</type>          <title><![CDATA[Tech Tower, Atlanta skyline]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[13c10000-p14-016_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/13c10000-p14-016_0_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/13c10000-p14-016_0_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/13c10000-p14-016_0_0.jpg?itok=f4Z38oRa]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tech Tower, Atlanta skyline]]></image_alt>                    <created>1449245805</created>          <gmt_created>2015-12-04 16:16:45</gmt_created>          <changed>1475895103</changed>          <gmt_changed>2016-10-08 02:51:43</gmt_changed>      </item>          <item>          <nid>413871</nid>          <type>image</type>          <title><![CDATA[Steve Cross]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[130425_ptb_7.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/130425_ptb_7_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/130425_ptb_7_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/130425_ptb_7_0.jpg?itok=rDfrSgsb]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Steve Cross]]></image_alt>                    <created>1449254239</created>          <gmt_created>2015-12-04 18:37:19</gmt_created>          <changed>1475895147</changed>          <gmt_changed>2016-10-08 02:52:27</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.uschamber.com/]]></url>        <title><![CDATA[U.S. Chamber of Commerce]]></title>      </link>          <link>        <url><![CDATA[http://www.news.gatech.edu/features/surviving-cyberspace]]></url>        <title><![CDATA[Georgia Tech Cybersecurity Experts]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="132"><![CDATA[Institute Leadership]]></category>          <category tid="133"><![CDATA[Special Events and Guest Speakers]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="132"><![CDATA[Institute Leadership]]></term>          <term tid="133"><![CDATA[Special Events and Guest Speakers]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="815"><![CDATA[economic development]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="167317"><![CDATA[Steve Cross]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="421691">  <title><![CDATA[Students Use Data Science to Solve Society’s Problems]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Fires will happen. But what if the Atlanta Fire Rescue Department could determine which buildings are at greatest risk of fire and prioritize inspections to focus on those sites?</p><p>The fire department is working to do just that thanks to a summer internship program sponsored by Georgia Tech and Oracle.</p><p>The city agency is one of four groups participating in this year’s <a href="http://dssg-atl.io">Data Science for Social Good</a> (DSSG), where 14 undergraduate and graduate students show non-profits and government agencies how data can tackle social and societal problems.</p><p>Other projects include maintaining and improving Atlanta’s urban forest, increasing efficiency for a popular hotline system, and working with Georgia Tech’s WiFi data to understand mobility patterns.</p><p>“It’s important to get students involved in real-world projects,” said Christopher LeDantec, co-director of the program and an assistant professor of digital media in the School of Literature, Media and Communication in the Ivan Allen College of Liberal Arts. “We are building out sustainable learning opportunities that allow students and Georgia Tech to have a wider impact in the community. “</p><p>The four students working with Atlanta Fire Rescue shadowed inspectors to learn not only how they work, but also how they create and use data. The students identified hundreds of additional commercial properties at high risk for a fire that should be inspected with greater frequency, said Matt Hinds-Aldrich, a management analyst with Atlanta Fire Rescue working with the student team.</p><p>The program is “helping us make more informed and data-driven decisions on how best to allocate our limited resources as we balance protecting residents, visitors and commerce in our community all while remaining fiscally responsible,” Hinds-Aldrich said.</p><p>While many public agencies and non-profits collect data, staff may be overwhelmed by the volume or may lack the time and capabilities to interpret the information, said Bistra Dilkina, co-director of the DSSG program and an assistant professor in the School of Computational Science and Engineering in the College of Computing.</p><p>The program shows groups how data can work to their advantage, while exposing students to different career paths, Dilkina said.</p><p>“Nonprofits and conservationists need data scientists, too,” she said.</p><p>Georgia Tech received more than a dozen project proposals, but could only staff four. More than 100 students applied for the 10-week paid internship and 14 were selected.</p><p>Richard Huckaby, a rising third-year student in computer engineering, joined because he wanted to learn new skills and help people.</p><p>He’s part of the team working with the United Way of Greater Atlanta on their 211-hotline system, which is a searchable database of city services. Students will suggest ways to improve and reconstruct the existing call menu to better organize incoming calls and reduce average wait time.</p><p>“There’s more to data science than commercialization or helping large companies,” he said.</p><p>To conduct their work, students pulled data from multiple sources and had to go through several steps before it was ready for analysis.</p><p>The urban forest team working with the City of Atlanta and Trees Atlanta relied on tax parcels, thermal maps, city inventories, floodplain data and other sources.</p><p>“Games and apps are fun, but we’re setting up a system the city and Trees Atlanta can build on in the future,” said Caroline Foster, who will start Georgia Tech’s masters program in Human-Computer Interaction next month.</p><p>Students from all four teams will present their findings and recommendations during a <a href="http://www.eventbrite.com/e/data-science-for-social-good-atlanta-final-demo-celebration-tickets-17510983824">public demonstration</a> scheduled to begin at 6:30 p.m. Thursday at Ponce City Market.&nbsp;</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1436264604</created>  <gmt_created>2015-07-07 10:23:24</gmt_created>  <changed>1475896732</changed>  <gmt_changed>2016-10-08 03:18:52</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Students in Data Science for Social Good show non-profits and government agencies how data can tackle social and societal problems.]]></teaser>  <type>news</type>  <sentence><![CDATA[Students in Data Science for Social Good show non-profits and government agencies how data can tackle social and societal problems.]]></sentence>  <summary><![CDATA[<p>The Atlanta Data Science for Social Good (DSSG) program is an intensive, 10-week paid internship experience that places students onto multi-disciplinary teams working under the supervision of a professor on a problem that comes from a partner in the City of Atlanta or a local non-profit company. The program is sponsored by Georgia Tech and Oracle.</p>]]></summary>  <dateline>2015-07-07T00:00:00-04:00</dateline>  <iso_dateline>2015-07-07T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-07-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Georgia Tech Media Relations<br />404-894-6016</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>421671</item>      </media>  <hg_media>          <item>          <nid>421671</nid>          <type>image</type>          <title><![CDATA[Data Science for Social Good]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[dssg_tshirt_2014-e1422645415733-1024x649.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/dssg_tshirt_2014-e1422645415733-1024x649_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/dssg_tshirt_2014-e1422645415733-1024x649_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/dssg_tshirt_2014-e1422645415733-1024x649_0.jpg?itok=eCBRNy8B]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Data Science for Social Good]]></image_alt>                    <created>1449254306</created>          <gmt_created>2015-12-04 18:38:26</gmt_created>          <changed>1475895160</changed>          <gmt_changed>2016-10-08 02:52:40</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://dssg-atl.io]]></url>        <title><![CDATA[Data Science for Social Good]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>          <category tid="154"><![CDATA[Environment]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>          <term tid="154"><![CDATA[Environment]]></term>      </news_terms>  <keywords>          <keyword tid="15092"><![CDATA[big data]]></keyword>          <keyword tid="96631"><![CDATA[Data Science for Social Good]]></keyword>          <keyword tid="4044"><![CDATA[internship]]></keyword>          <keyword tid="167070"><![CDATA[serve•learn•sustain]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="419071">  <title><![CDATA[SAPH-ire Helps Scientists Prioritize Protein Modification Research]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Researchers have developed a new informatics technology that analyzes existing data repositories of protein modifications and 3D protein structures to help scientists identify and target research on “hotspots” most likely to be important for biological function.</p><p>Known as SAPH-ire (Structural Analysis of PTM Hotspots), the tool could accelerate the search for potential new drug targets on protein structures, and lead to a better understanding of how proteins communicate with one another inside cells. SAPH-ire has been tested on a well studied class of proteins involved in cellular communication, where it correctly predicted a previously-unknown regulatory element.</p><p>“SAPH-ire predicts positions on proteins that are likely to be important for biological function based on how many times those parts of the proteins have been found in a chemically-modified state when they are taken out of a cell,” explained <a href="http://www.biology.gatech.edu/people/matthew-torres">Matthew Torres</a>, an assistant professor in the <a href="http://www.biology.gatech.edu">School of Biology</a> at the Georgia Institute of Technology. “SAPH-ire is a tool for discovery, and we think it will lead to a new understanding of how proteins are connected in cells.”</p><p>The tool and its proof-of-concept testing were reported June 12 in the journal <em>Molecular and Cellular Proteomics</em>. The research was supported by the National Institutes of Health’s National Institute of General Medical Sciences (NIGMS) and Georgia Tech.</p><p>Through modern mass spectrometry proteomics techniques, scientists have identified more than 300,000 post-translational modifications (PTMs) in different families of proteins across numerous species. These PTMs come in many forms, resulting from the action of different enzymes, and are often indicators of how and where proteins contact one another to bring about different cell behaviors. The number of PTMs detected by mass spectrometry has grown so rapidly that researchers experimentally investigating the function of the modifications have been unable to keep up.</p><p>“Mass spectrometry is so effective that it has created an exponential curve in the knowledge of how proteins are modified,” said Torres. “The rate at which we can detect new PTMs has now far surpassed the rate at which we can understand what they do, from a classical biochemical approach. You have so much information that you don’t know where to begin.”</p><p>But that’s exactly where SAPH-ire begins. Aimed at bridging the gap between PTM detection and analysis of function, SAPH-ire collects non-redundant and experimentally verified PTM data across all known members of a protein family. Since members of a protein family share the same or similar protein structures, PTMs found within the family can be related to one another in three-dimensional space to produce a set of observed PTM frequencies, termed “hotspots.”</p><p>The PTM hotspots are projected onto 3D protein structures available in the Protein Data Bank (PDB), which allows the entire set of family-specific PTMs to be visualized on any protein structure that is representative for the family. Once projected there, SAPH-ire integrates multiple quantitative features from each hotspot to create a PTM “Functional Potential Score.” Each PTM hotspot can then be ranked in order of highest to lowest potential for having significant biological function.</p><p>“We have gone through all of what might be considered the meta-data that exists in the public domain, collected all the PTMs and all the structures, then organized them into their specific protein families,” Torres explained. “We are looking at PTMs through time, in a sense, because we have information from organisms that are evolutionarily distant from each other, though their proteins are related as members of a protein family.”</p><p>To prioritize research with the most significant potential impact, scientists might examine PTM hotspots that SAPH-ire identifies as having high function potential, but no known function.</p><p>Torres’ lab has been investigating unique families of “G” proteins, some of which cooperate with cell surface receptors that control the binding of hormones and neurotransmitters, as well as a majority of pharmaceutical drugs. Because of their importance to therapeutics, these proteins have been extensively studied over a period of 50 years or so. Using SAPH-ire, the researchers discovered something surprising about this group of protein families.</p><p>“We discovered a new regulatory element within a specific G protein family that has been largely ignored because it’s pretty unimpressive from a purely structural viewpoint,” Torres said. “SAPH-ire predicted that this element was going to be important from a modification point of view, and we confirmed experimentally that it was.”</p><p>SAPH-ire was conceived by Torres and developed by him and graduate student Henry Dewhurst, while experimental validation of the tool was accomplished by graduate student Shilpa Choudhury. Their next step is to develop collaborations with scientists who will try it out on the protein families they study. The Georgia Tech researchers are also creating a database that other protein scientists can query to help them identify and prioritize PTM hotspots, and they expect to see their program become part of informatics systems used to analyze large volumes of proteomics data emerging from labs around the world.</p><p>“SAPH-ire will help bring meaning and context to all the data that is being produced about PTMs,” Torres said. “Connecting SAPH-ire to other programs that convert mass spec data into actual PTM data could provide immediate biological relevance and prioritization for biochemists and others. It is likely to expose many new and unsuspected relationships between protein modification, protein structure and function.”</p><p><em>This research was supported by the National Institutes of Health, National Institute of General Medical Sciences (NIGMS), under grant number 5R00 GM094533-05. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health.</em></p><p><strong>CITATION</strong>: Henry M. Dewhurst, Shilpa Choudhury and Matthew P. Torres, “Structural Analysis of PTM Hotspots (SAPH-ire) – a Quantitative Informatics Method Enabling the Discovery of Novel Regulatory Elements in Protein Families,” (Molecular and Cellular Proteomics, 2015). <a href="http://dx.doi.org/10.1074/mcp.M115.051177">http://dx.doi.org/10.1074/mcp.M115.051177</a></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>).<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1435513553</created>  <gmt_created>2015-06-28 17:45:53</gmt_created>  <changed>1475896729</changed>  <gmt_changed>2016-10-08 03:18:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[New informatics technology analyzes existing data repositories of protein modifications and 3D protein structures to help scientists target research on “hotspots” most likely to be important for biological function.]]></teaser>  <type>news</type>  <sentence><![CDATA[New informatics technology analyzes existing data repositories of protein modifications and 3D protein structures to help scientists target research on “hotspots” most likely to be important for biological function.]]></sentence>  <summary><![CDATA[<p>Researchers have developed a new informatics technology that analyzes existing data repositories of protein modifications and 3D protein structures to help scientists identify and target research on “hotspots” most likely to be important for biological function.</p>]]></summary>  <dateline>2015-06-29T00:00:00-04:00</dateline>  <iso_dateline>2015-06-29T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-06-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>419041</item>          <item>419061</item>      </media>  <hg_media>          <item>          <nid>419041</nid>          <type>image</type>          <title><![CDATA[SAPHire Diagram]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[saphire-schematic.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/saphire-schematic_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/saphire-schematic_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/saphire-schematic_1.jpg?itok=j6YqTlic]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[SAPHire Diagram]]></image_alt>                    <created>1449254269</created>          <gmt_created>2015-12-04 18:37:49</gmt_created>          <changed>1475895155</changed>          <gmt_changed>2016-10-08 02:52:35</gmt_changed>      </item>          <item>          <nid>419061</nid>          <type>image</type>          <title><![CDATA[SAPHire Visualization]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[saphire-protein.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/saphire-protein_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/saphire-protein_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/saphire-protein_0.jpg?itok=gRYIIDVl]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[SAPHire Visualization]]></image_alt>                    <created>1449254269</created>          <gmt_created>2015-12-04 18:37:49</gmt_created>          <changed>1475895155</changed>          <gmt_changed>2016-10-08 02:52:35</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="2546"><![CDATA[bioinformatics]]></keyword>          <keyword tid="130671"><![CDATA[drug targets]]></keyword>          <keyword tid="7937"><![CDATA[informatics]]></keyword>          <keyword tid="130651"><![CDATA[Matthew Torrest]]></keyword>          <keyword tid="130661"><![CDATA[post-translational hotspots]]></keyword>          <keyword tid="3003"><![CDATA[protein]]></keyword>          <keyword tid="169734"><![CDATA[SAPH-ire]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="405111">  <title><![CDATA[New chip architecture may provide foundation for quantum computer]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Quantum computers are in theory capable of simulating the interactions of molecules at a level of detail far beyond the capabilities of even the largest supercomputers today. Such simulations could revolutionize chemistry, biology and materials science, but the development of quantum computers has been limited by the ability to increase the number of quantum bits, or qubits, that encode, store and access large amounts of data.</p><p>In a paper published in the <em>Journal of Applied Physics</em>, a team of researchers at the <a href="http://www.gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI) and Honeywell International have demonstrated a new device that allows more electrodes to be placed on a chip – an important step that could help increase qubit densities and bring us one step closer to a quantum computer that can simulate molecules or perform other algorithms of interest.</p><p>"To write down the quantum state of a system of just 300 qubits, you would need 2^300 numbers, roughly the number of protons in the known universe, so no amount of Moore's Law scaling will ever make it possible for a classical computer to process that many numbers," said Nicholas Guise, a GTRI research scientist who led the research. "This is why it's impossible to fully simulate even a modest sized quantum system, let alone something like chemistry of complex molecules, unless we can build a quantum computer to do it."</p><p>While existing computers use classical bits of information, quantum computers use "quantum bits" or qubits to store information. Classical bits use either a 0 or 1, but a qubit, exploiting a weird quantum property called superposition, can actually be in both 0 and 1 simultaneously, allowing much more information to be encoded. Since qubits can be correlated with each other in a way that classical bits cannot, they allow a new sort of massively parallel computation, but only if many qubits at a time can be produced and controlled. The challenge that the field has faced is scaling this technology up, much like moving from the first transistors to the first computers.</p><p>One leading qubit candidate is individual ions trapped inside a vacuum chamber and manipulated with lasers. The scalability of current trap architectures is limited since the connections for the electrodes needed to generate the trapping fields come at the edge of the chip, and their number are therefore limited by the chip perimeter.</p><p>The GTRI/Honeywell approach uses new microfabrication techniques that allow more electrodes to fit onto the chip while preserving the laser access needed.</p><p>The team's design borrows ideas from a type of packaging called a ball grid array (BGA) that is used to mount integrated circuits. The ball grid array's key feature is that it can bring electrical signals directly from the backside of the mount to the surface, thus increasing the potential density of electrical connections.</p><p>The researchers also freed up more chip space by replacing area-intensive surface or edge capacitors with trench capacitors and strategically moving wire connections.</p><p>The space-saving moves allowed tight focusing of an addressing laser beam for fast operations on single qubits. Despite early difficulties bonding the chips, a solution was developed in collaboration with Honeywell, and the device was trapping ions from the very first day.</p><p>The team was excited with the results. "Ions are very sensitive to stray electric fields and other noise sources, and a few microns of the wrong material in the wrong place can ruin a trap. But when we ran the BGA trap through a series of benchmarking tests we were pleasantly surprised that it performed at least as well as all our previous traps," Guise said.</p><p>Working with trapped ion qubits currently requires a room full of bulky equipment and several graduate students to make it all run properly, so the researchers say much work remains to be done to shrink the technology. The BGA project demonstrated that it's possible to fit more and more electrodes on a surface trap chip while wiring them from the back of the chip in a compact and extensible way. However, there are a host of engineering challenges that still need to be addressed to turn this into a miniaturized, robust and nicely packaged system that would enable quantum computing, the researchers say.</p><p>In the meantime, these advances have applications beyond quantum computing. "We all hope that someday quantum computers will fulfill their vast promise, and this research gets us one step closer to that," Guise said. "But another reason that we work on such difficult problems is that it forces us to come up with solutions that may be useful elsewhere. For example, microfabrication techniques like those demonstrated here for ion traps are also very relevant for making miniature atomic devices like sensors, magnetometers and chip-scale atomic clocks."</p><p>This work was funded by the Intelligence Advanced Research Projects Activity (IARPA).</p><p><em>The article, "Ball-grid array architecture for microfabricated ion traps," is authored by Nicholas D. Guise, Spencer D. Fallek, Kelly E. Stevens, K. R. Brown, Curtis Volin, Alexa W. Harter, Jason M. Amini, Robert E. Higashi, Son Thai Lu, Helen M. Chanhvongsak, Thi A. Nguyen, Matthew S. Marcus, Thomas R. Ohnstein and Daniel W. Youngner. It appears in the Journal of Applied Physics and can be accessed at:</em> <a href="http://scitation.aip.org/content/aip/journal/jap/117/17/10.1063/1.4917385">http://scitation.aip.org/content/aip/journal/jap/117/17/10.1063/1.4917385</a></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Lance Wallace (404-407-7280) (<a href="mailto:lance.wallace@gtri.gatech.edu">lance.wallace@gtri.gatech.edu</a>).</p><p><em><strong>Article written by the American Institute of Physics.</strong></em></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1431896377</created>  <gmt_created>2015-05-17 20:59:37</gmt_created>  <changed>1475896697</changed>  <gmt_changed>2016-10-08 03:18:17</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a microfabricated ion trap architecture that could enable quantum computers.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a microfabricated ion trap architecture that could enable quantum computers.]]></sentence>  <summary><![CDATA[<p>Researchers at the Georgia Tech Research Institute and Honeywell have developed a microfabricated ion trap architecture that holds promise for increasing the density of qubits in future quantum computers.</p>]]></summary>  <dateline>2015-05-18T00:00:00-04:00</dateline>  <iso_dateline>2015-05-18T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-05-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>405061</item>          <item>405081</item>          <item>405091</item>          <item>405101</item>      </media>  <hg_media>          <item>          <nid>405061</nid>          <type>image</type>          <title><![CDATA[Quantum computer architecture]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[chip-architecture2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/chip-architecture2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/chip-architecture2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/chip-architecture2.jpg?itok=t2XFGDs9]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Quantum computer architecture]]></image_alt>                    <created>1449254135</created>          <gmt_created>2015-12-04 18:35:35</gmt_created>          <changed>1475895127</changed>          <gmt_changed>2016-10-08 02:52:07</gmt_changed>      </item>          <item>          <nid>405081</nid>          <type>image</type>          <title><![CDATA[Quantum computer architecture2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[chip-architecture3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/chip-architecture3.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/chip-architecture3.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/chip-architecture3.jpg?itok=E8TuV2le]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Quantum computer architecture2]]></image_alt>                    <created>1449254135</created>          <gmt_created>2015-12-04 18:35:35</gmt_created>          <changed>1475895127</changed>          <gmt_changed>2016-10-08 02:52:07</gmt_changed>      </item>          <item>          <nid>405091</nid>          <type>image</type>          <title><![CDATA[Ion trap assembly]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bgatrapphoto.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bgatrapphoto.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bgatrapphoto.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bgatrapphoto.png?itok=SmkXalqC]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Ion trap assembly]]></image_alt>                    <created>1449254135</created>          <gmt_created>2015-12-04 18:35:35</gmt_created>          <changed>1475895127</changed>          <gmt_changed>2016-10-08 02:52:07</gmt_changed>      </item>          <item>          <nid>405101</nid>          <type>image</type>          <title><![CDATA[Ion trap connections]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bumpbonding.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bumpbonding.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bumpbonding.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bumpbonding.jpg?itok=B5Fjs5MM]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Ion trap connections]]></image_alt>                    <created>1449254135</created>          <gmt_created>2015-12-04 18:35:35</gmt_created>          <changed>1475895127</changed>          <gmt_changed>2016-10-08 02:52:07</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="150"><![CDATA[Physics and Physical Sciences]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="150"><![CDATA[Physics and Physical Sciences]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="126271"><![CDATA[ion trap. qubit]]></keyword>          <keyword tid="1744"><![CDATA[quantum]]></keyword>          <keyword tid="4359"><![CDATA[quantum computing]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="400051">  <title><![CDATA[Research advances security and trust in reconfigurable devices]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A research team at the <a href="http://www.gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI) is studying a range of security challenges involving programmable logic devices – in particular, field programmable gate arrays (FPGAs).</p><p>FPGAs are integrated circuits whose hardware can be reconfigured – even partially during run-time – enabling users to create their own customized, evolving microelectronic designs. They combine hardware performance and software flexibility so well that they're increasingly used in aerospace, defense, consumer devices, high-performance computing, vehicles, medical devices, and other applications.</p><p>But these feature-rich devices come with potential vulnerabilities – the very configurability of an FPGA can be used to compromise its security. The slightest tweak, accidental or malicious, to the internal configuration of a programmable device can drastically affect its functionality. Conversely, when security and trust assurances can be established for these devices, they can provide increased, higher-performance resilience against cyber attacks than difficult-to-assure software-based protections.</p><p>The GTRI researchers have identified multiple issues that could become serious threats as these devices become increasingly common.</p><p>"Because FPGAs are programmable and they tightly couple software and hardware interfaces, there's concern they may introduce a whole new class of vulnerabilities compared to other microelectronic devices," said Lee W. Lerner, a researcher who leads the GTRI team studying FPGA security. "There are entirely new attack vectors to consider, ones that lie outside the traditional computer security mindset."</p><p>Conventional protections such as software or network-based security measures could be undermined by altering the logic of a system utilizing programmable devices.</p><p>"The potential to access and modify the underlying hardware of a system is like hacker Nirvana," Lerner said.</p><p>Traditional hardware security evaluation practices – such as X-raying chips to look for threats built-in during manufacturing – are of little use since an FPGA could be infected with Trojan logic or malware after system deployment. Most programmable devices are still at risk, including those embedded in autonomous vehicles, critical infrastructure, wearable computing devices, and in the Internet of Things, a term that refers to online control devices ranging from smart thermostats to industrial systems.</p><p><strong>Myriad Possibilities</strong></p><p>FPGA chips are constructed from heterogeneous logic blocks such as digital signal processors, block memory, processor cores, and arrays of programmable electronic logic gates. They also include a vast interconnected array that implements signal routing between logic blocks. Their functionality is dictated by the latest configuration bitstream downloaded to the device, commonly referred to as a design.</p><p>An FPGA's adaptability gives it clear advantages over the familiar application-specific integrated circuit (ASIC), which comes from the foundry with its functionality permanently etched in silicon. Unlike an ASIC, for instance, an FPGA containing some sort of error can often be quickly fixed in the field. One example application which utilizes this flexibility well is software-defined radio, where an FPGA can function as one type of signal-processing circuit and then quickly morph into another to support a different type of waveform.</p><p>The earliest FPGAs appeared 30 years ago, and today their logic circuits can replicate a wide range of reconfigurable devices including entire central processing units and other microprocessors. New internal configurations are using high-level programming languages and synthesis tools, or low-level hardware description languages and implementation tools, which can reassemble an FPGA's internal structures.</p><p>Depending on how they are set up, FPGAs can be configured from external sources or even internally by sub-processes. Lerner refers to their internal configuration capability as a type of "self-surgery" – an analogy for how risky it can be.</p><p>Additionally, because FPGA architectures are so dense and heterogeneous, it's very difficult to fully utilize all their resources with any single design, he explained.</p><p>"For instance, there are many possibilities for how to make connections between logic elements," he said. "Unselected or unused resources can be used for nefarious things like implementing a Trojan function or creating an internal antenna."</p><p><strong>Anticipating Attacks</strong></p><p>To exploit an FPGA's vast resources, bad actors might find ways to break into the device or steal design information. Lerner and his team are investigating ways in which hackers might gain the critical knowledge necessary to compromise a chip.</p><p>One potential avenue of attack involves "side-channels" – physical properties of circuit operation that can be monitored externally. A knowledgeable enemy could probe side-channels, such as electromagnetic fields or sounds emitted by a working device, and potentially gain enough information about its internal operations to crack even mathematically sound encryption methods used to protect the design.</p><p>In another scenario, third-party intellectual property modules or even design tools from FPGA manufacturers could harbor malicious functionality; such modules and tools typically operate using proprietary formats that are difficult to verify. Alternatively, a rogue employee or intruder could simply walk up to a board and reprogram an FPGA by accessing working external test points. In some systems, wireless attacks are a possibility as well.</p><p>FPGAs even contend with physical phenomena to maintain steady operation. Most reprogrammable chips are susceptible to radiation-induced upsets. Incoming gamma rays or high-energy particles could flip configuration values, altering the design function.</p><p>Lerner points to a real-world example: Google Glass, the well-known head-mounted optical technology, which uses an FPGA to control its display.</p><p><strong>Multiple Security Techniques</strong></p><p>To provide assurance in programmable logic designs, Lerner and his team are developing multiple techniques, such as:</p><ul><li>Innovative visualization methods that enable displaying/identifying/navigating patterns in massive logic designs that could include hundreds of thousands of nodes and connections;</li><li>Applications of high-level formal analysis tools, which aid the validation and verification process;</li><li>System-level computer simulations focused on emulating how heterogeneous microelectronics like FPGAs function alongside other system components.</li></ul><p>The GTRI team is also engaged in other areas of research that support design security analysis, including exact- and fuzzy-pattern matching, graph analytics, machine learning / emergent behavior, logic reduction, waveform simulation, and large graph visualization.</p><p>The team also researches architectures to support trustworthy embedded computing in a variety of applications, such as cyber-physical control. They have developed the Trustworthy Autonomic Interface Guardian Architecture (TAIGA), a digital measure that is mapped onto a configurable chip such as an FPGA and is wrapped around the interfaces of process controllers. Its goal is to establish a "root-of-trust" in the system, a term that refers to a set of functions that can always be trusted, in this case to preserve system safety and security.</p><p>TAIGA monitors how an embedded controller process is functioning within the system, to assure that it's controlling the process within specification. Because TAIGA can detect if something is trying to tamper with the physical process under control, it removes the need to fully trust other more vulnerable parts of the system such as supervisory software processes or even the control code itself.</p><p>"TAIGA ensures process stability – even if that requires overriding commands from the processor or supervisory nodes," Lerner said. "It's analogous to the autonomic nervous system of the body, which keeps your heart beating and your lungs respiring – the basic things that your body should be doing to be in a stable state, regardless of anything else that's going on."</p><p>The team has installed a version of the TAIGA system on a small robot running the Linux operating system. Georgia Tech students and other interested persons are invited to manipulate the installation and the robot online to try to compromise its control system at the team’s main website, <a href="http://configlab.gatech.edu" title="http://configlab.gatech.edu">http://configlab.gatech.edu</a>, when the experiment is ready.</p><p>"We provide formal assurances that TAIGA will prevent anyone from hacking critical control processes and causing the robot to perform actions deemed unsafe," Lerner said. "However, if someone figures out how to run the robot into a wall or damage its cargo, for instance, then obviously we'll know we have more work to do."<br /> <br /><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Lance Wallace (404-407-7280) (<a href="mailto:lance.wallace@gtri.gatech.edu">lance.wallace@gtri.gatech.edu</a>).</p><p><strong>Writer</strong>: Rick Robinson</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1430166747</created>  <gmt_created>2015-04-27 20:32:27</gmt_created>  <changed>1475896688</changed>  <gmt_changed>2016-10-08 03:18:08</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are studying a range of security challenges involving programmable logic devices.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are studying a range of security challenges involving programmable logic devices.]]></sentence>  <summary><![CDATA[<p>A research team at the Georgia Tech Research Institute (GTRI) is studying a range of security challenges involving programmable logic devices – in particular, field programmable gate arrays (FPGAs). &nbsp;</p>]]></summary>  <dateline>2015-04-28T00:00:00-04:00</dateline>  <iso_dateline>2015-04-28T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-04-28 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>400041</item>          <item>400031</item>      </media>  <hg_media>          <item>          <nid>400041</nid>          <type>image</type>          <title><![CDATA[FPGA Testing2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fpga1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fpga1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fpga1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fpga1.jpg?itok=NrpoN7Qj]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[FPGA Testing2]]></image_alt>                    <created>1449246388</created>          <gmt_created>2015-12-04 16:26:28</gmt_created>          <changed>1475895117</changed>          <gmt_changed>2016-10-08 02:51:57</gmt_changed>      </item>          <item>          <nid>400031</nid>          <type>image</type>          <title><![CDATA[FPGA Testing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fpga2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fpga2.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fpga2.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fpga2.jpg?itok=JmNT08MA]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[FPGA Testing]]></image_alt>                    <created>1449246388</created>          <gmt_created>2015-12-04 16:26:28</gmt_created>          <changed>1475895117</changed>          <gmt_changed>2016-10-08 02:51:57</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="124871"><![CDATA[FPGA]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="63161"><![CDATA[integrated circuits]]></keyword>          <keyword tid="124901"><![CDATA[programmable logic]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="365761">  <title><![CDATA[Georgia Tech grad among White House guests for State of the Union]]></title>  <uid>27918</uid>  <body><![CDATA[<p>Kathy Pham’s Georgia Tech degrees took her to high-profile places, such as IBM and Google. Tonight the computer scientist finds herself in another enviable spot – a seat near first lady Michelle Obama at the 2015 State of the Union address.</p><p>Pham is among the 22 people the White House invited to hear President Obama’s speech from the first lady’s box.</p><p>Pham graduated from Tech with a computer science degree in 2007 and completed her master’s degree in 2009, focusing on human-computer interaction.&nbsp;</p><p>She currently works for the administration’s new U.S. Digital Service, which aims to make the federal government more tech-savvy. Her duties include improving digital healthcare for veterans.</p><p>The job is a personal one. Pham’s brother, David, is also a Georgia Tech graduate who earned a Purple Heart for his service with the United States Marine Corps in Afghanistan.</p><p>Kathy Pham is known for using her tech skills to solve problems. She helped her mother battle leukemia and blogged about their experiences at <a href="http://www.teammamapham.org">Team Mama Pham</a>. &nbsp;</p><p>In fact, the White House singled out Pham for her ability to merge tech know-how with a passion for public service.</p><p>“Kathy, a computer scientist, has used technology throughout her career to tackle pressing challenges,” <a href="http://www.whitehouse.gov/blog/2015/01/18/meet-kathy-pham-guest-first-lady-state-union">according to the White House</a>. “From Google to IBM to Harris Healthcare Solutions, she's designed health care interoperability software, studied disease trends with data analytics, and built data warehouses for hospitals.”</p><p>While studying at Tech, Pham won Microsoft’s Imagine Cup, a premier global student technology competition. &nbsp;</p><p>She also received the Anita Borg Memorial Scholarship from Google and in 2006 was named the College of Computing’s most outstanding junior student.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1421767188</created>  <gmt_created>2015-01-20 15:19:48</gmt_created>  <changed>1475896674</changed>  <gmt_changed>2016-10-08 03:17:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Kathy Pham is among the 22 people the White House invited to hear President Obama’s speech from the first lady’s box.]]></teaser>  <type>news</type>  <sentence><![CDATA[Kathy Pham is among the 22 people the White House invited to hear President Obama’s speech from the first lady’s box.]]></sentence>  <summary><![CDATA[<p>Kathy Pham&nbsp;currently works for the administration’s new U.S. Digital Service, which aims to make the federal government more tech-savvy.&nbsp;</p>]]></summary>  <dateline>2015-01-20T00:00:00-05:00</dateline>  <iso_dateline>2015-01-20T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-01-20 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Kathy Pham graduated from Tech with a computer science degree in 2007 and completed her master’s degree in 2009]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Georgia Tech Media Relations<br />404-894-6016</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>365781</item>      </media>  <hg_media>          <item>          <nid>365781</nid>          <type>image</type>          <title><![CDATA[Kathy Pham]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[009005b.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/009005b_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/009005b_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/009005b_0.jpg?itok=C_q7bNr-]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Kathy Pham]]></image_alt>                    <created>1449245805</created>          <gmt_created>2015-12-04 16:16:45</gmt_created>          <changed>1475895103</changed>          <gmt_changed>2016-10-08 02:51:43</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="130"><![CDATA[Alumni]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="130"><![CDATA[Alumni]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="1051"><![CDATA[Computer Science]]></keyword>          <keyword tid="469"><![CDATA[federal government]]></keyword>          <keyword tid="246"><![CDATA[Georgia Institute of Technology]]></keyword>          <keyword tid="109"><![CDATA[Georgia Tech]]></keyword>          <keyword tid="115131"><![CDATA[kathy pham]]></keyword>          <keyword tid="169706"><![CDATA[State of the Union address]]></keyword>          <keyword tid="817"><![CDATA[White House]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="366871">  <title><![CDATA[Self-powered intelligent keyboard could provide a new layer of security]]></title>  <uid>27303</uid>  <body><![CDATA[<p>By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users. The self-powered device generates electricity when a user’s fingertips contact the multi-layer plastic materials that make up the device.</p><p>“This intelligent keyboard changes the traditional way in which a keyboard is used for information input,” said Zhong Lin Wang, a Regents professor in the <a href="http://www.mse.gatech.edu/">School of Materials Science and Engineering</a> at the Georgia Institute of Technology. “Every punch of the keys produces a complex electrical signal that can be recorded and analyzed.”</p><p>Conventional keyboards record when a keystroke makes a mechanical contact, indicating the press of a specific key. The intelligent keyboard records each letter touched, but also captures information about the amount of force applied to the key and the length of time between one keystroke and the next. Such typing style is unique to individuals, and so could provide a new biometric for securing computers from unauthorized use.</p><p>In addition to providing a small electrical current for registering the key presses, the new keyboard could also generate enough electricity to charge a small portable electronic device or power a transmitter to make the keyboard wireless.</p><p>An effect known as contact electrification generates current when the user’s fingertips touch a plastic material on which a layer of electrode material has been coated. Voltage is generated through the triboelectric and electrostatic induction effects. Using the triboelectric effect, a small charge can be produced whenever materials are brought into contact and then moved apart.</p><p>“Our skin is dielectric and we have electrostatic charges in our fingers,” Wang noted. “Anything we touch can become charged.”</p><p>While the self-powered feature could provide a convenience benefit and potentially eliminate the need for batteries in wireless keyboards, Wang believes the major impact of the device may be in helping to secure computers by using individual typing patterns or habits as a biometric.</p><p>“This has the potential to be a new means for identifying users,” he said. “With this system, a compromised password would not allow a cyber-criminal onto the computer. The way each person types even a few words is individual and unique.”</p><p>To evaluate the authentication potential of the keyboard, the research team asked 104 persons to type the word “touch” four times, and recorded the electrical patterns produced. Using signal analysis techniques, they were able to differentiate individual typing patterns with low error rates, Wang said.</p><p>Instead of individual mechanical keys as in traditional keyboards, Wang’s intelligent keyboard is made up of vertically-stacked transparent film materials. Researchers begin with a layer of polyethylene terephthalate between two layers of indium tin oxide (ITO) that form top and bottom electrodes.</p><p>Next, a layer of fluorinated ethylene propylene (FEP) is applied onto the ITO surface to serve as an electrification layer that generates triboelectric charges when touched by fingertips. FEP nanowire arrays are formed on the exposed FEP surface through reactive ion etching.</p><p>The keyboard’s operation is based on coupling between contact electrification and electrostatic induction, rather than the traditional mechanical switching. When a finger contacts the FEP, charge is transferred at the contact interface, injecting electrons from the skin into the material and creating a positive charge.</p><p>When the finger moves away, the negative charges on the FEP side induces positive charges on the top electrode, and equal amounts of negative charges on the bottom electrode.</p><p>Consecutive keystrokes produce a periodic electrical field that drives reciprocating flows of electrons between the electrodes. Though eventually dissipating, the charges remain on the FEP surface for an extended period of time.</p><p>Wang believes the new smart keyboard will be competitive with existing keyboards, in both cost and durability. The new device is based on inexpensive materials that are widely used in the electronics industry.</p><p>As part of the study, his research group evaluated the keyboard under challenging conditions, including application of moisture, dirt and oil. “You could pour coffee on the keyboard, and it would not be damaged,” said Wang. “Because it is based on a sheet of plastic, liquids will not hurt it.”</p><p>The research was reported December 30 online in the journal <em>ACS Nano</em>. It was sponsored by the U.S. Department of Energy’s Office of Basic Energy Sciences.</p><p>In addition to Wang, the research team included first author Jun Chen from Georgia Tech’s School of Materials Science and Engineering; Guang Zhu from the Beijing Institute of Nanoenergy and Nanosystems; Jin Yang from Chongqing University; Qingshen Jing, Peng Bai, Weiqing Yang, and Yuanjie Su from Georgia Tech; and&nbsp;Xuewei Qi from the University of California, Riverside.</p><p><em>This material is based on work supported by the U.S. Department of Energy under award DE-FG02-07ER46394. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the DOE.</em></p><p><strong>CITATION</strong>: Jun Chen, et al., “Personalized Keystroke Dynamics for Self-Powered Human-Machine Interfacing,” (ACS Nano 2014). <a href="http://pubs.acs.org/doi/abs/10.1021/nn506832w" title="http://pubs.acs.org/doi/abs/10.1021/nn506832w">http://pubs.acs.org/doi/abs/10.1021/nn506832w</a><br /><br /><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986) or Brett Israel (<a href="mailto:brett.israel@comm.gatech.edu">brett.israel@comm.gatech.edu</a>) (404-385-1933).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1421927967</created>  <gmt_created>2015-01-22 11:59:27</gmt_created>  <changed>1475896674</changed>  <gmt_changed>2016-10-08 03:17:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users.]]></sentence>  <summary><![CDATA[<p>By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users. The self-powered device generates electricity when a user’s fingertips contact the multi-layer plastic materials that make up the device.</p>]]></summary>  <dateline>2015-01-22T00:00:00-05:00</dateline>  <iso_dateline>2015-01-22T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-01-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>366861</item>          <item>366851</item>      </media>  <hg_media>          <item>          <nid>366861</nid>          <type>image</type>          <title><![CDATA[Intelligent keyboard for improved security2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[intelligent-keyboard5.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/intelligent-keyboard5_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/intelligent-keyboard5_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/intelligent-keyboard5_0.jpg?itok=p9DYiJDJ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Intelligent keyboard for improved security2]]></image_alt>                    <created>1449245817</created>          <gmt_created>2015-12-04 16:16:57</gmt_created>          <changed>1475895103</changed>          <gmt_changed>2016-10-08 02:51:43</gmt_changed>      </item>          <item>          <nid>366851</nid>          <type>image</type>          <title><![CDATA[Intelligent keyboard for improved security]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[intelligent-keyboard2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/intelligent-keyboard2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/intelligent-keyboard2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/intelligent-keyboard2_0.jpg?itok=5b-cLBjz]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Intelligent keyboard for improved security]]></image_alt>                    <created>1449245817</created>          <gmt_created>2015-12-04 16:16:57</gmt_created>          <changed>1475895103</changed>          <gmt_changed>2016-10-08 02:51:43</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="9223"><![CDATA[computer security]]></keyword>          <keyword tid="6019"><![CDATA[keyboard]]></keyword>          <keyword tid="169401"><![CDATA[self-powered]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39471"><![CDATA[Materials]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="368761">  <title><![CDATA[Keeping our health data safe]]></title>  <uid>27918</uid>  <body><![CDATA[<p>The medical care we receive is changing rapidly, thanks to the information collected through our smartphones, tablets and other devices.</p><p>While this data has the potential to improve our lives, it also reveals a critical question. How do we keep our health data secure?</p><p>Georgia Tech’s Scheller College of Business and the School of Interactive Computing are hosting a panel discussion Wednesday afternoon with leading experts to explore the future of health privacy and the pioneering technologies that are changing health care.</p><p>The event — which is also sponsored by the National Cyber Security Alliance, Alston &amp; Bird, LLP and Merck — is one of several taking place across the country in honor of Data Privacy Day.</p><p>The Georgia Tech panel will look at how to balance health benefits and innovation while assuring privacy and data security.</p><p>The panel <a href="http://www.cc.gatech.edu/calendar/day/2015/01/28/4927">will be held at the Academy of Medicine</a> and will be <a href="http://new.livestream.com/NCSA/dataprivacyday">livestreamed</a>.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1422373149</created>  <gmt_created>2015-01-27 15:39:09</gmt_created>  <changed>1475896674</changed>  <gmt_changed>2016-10-08 03:17:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Experts will discuss the future of health privacy and pioneering technologies.]]></teaser>  <type>news</type>  <sentence><![CDATA[Experts will discuss the future of health privacy and pioneering technologies.]]></sentence>  <summary><![CDATA[<p>Georgia Tech professors and other experts will discuss how to balance health benefits and innovation while assuring privacy and data security. The panel iis one of several taking place across the country in honor of Data Privacy Day.</p>]]></summary>  <dateline>2015-01-27T00:00:00-05:00</dateline>  <iso_dateline>2015-01-27T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-01-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Georgia Tech co-sponsors panel discussion in honor of Data Privacy Day]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Georgia Tech Media Relations<br />404-894-6016</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>99421</item>      </media>  <hg_media>          <item>          <nid>99421</nid>          <type>image</type>          <title><![CDATA[Georgia Institute of Technology]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449178150</created>          <gmt_created>2015-12-03 21:29:10</gmt_created>          <changed>1475894715</changed>          <gmt_changed>2016-10-08 02:45:15</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="15092"><![CDATA[big data]]></keyword>          <keyword tid="92811"><![CDATA[data science]]></keyword>          <keyword tid="116361"><![CDATA[health IT; privacy]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="362191">  <title><![CDATA[Researchers work to counter a new class of coffee shop hackers]]></title>  <uid>27303</uid>  <body><![CDATA[<p>If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wi-fi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits even when it’s not connected to the Internet.</p><p>And smartphones may be even more vulnerable to such spying.</p><p>Researchers at the Georgia Institute of Technology are investigating where these information “leaks” originate so they can help hardware and software designers develop strategies to plug them. By studying emissions from multiple computers, the researchers have developed a metric for measuring the strength of the leaks – known technically as “side-channel signal” – to help prioritize security efforts.</p><p>“People are focused on security for the Internet and on the wireless communication side, but we are concerned with what can be learned from your computer without it intentionally sending anything,” said Alenka Zajic, an assistant professor in Georgia Tech’s <a href="http://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a>. “Even if you have the Internet connection disabled, you are still emanating information that somebody could use to attack your computer or smartphone.”</p><p>Results of the research were presented December 15 at the 47th Annual IEEE/ACM International Symposium on Microarchitecture in Cambridge, U.K. The work is sponsored by the National Science Foundation and the Air Force Office of Scientific Research.</p><p>Side-channel emissions can be measured several feet away from an operating computer using a variety of spying methods. Electromagnetic emissions can be received using antennas hidden in a briefcase, for instance. Acoustic emissions – sounds produced by electronic components such as capacitors – can be picked up by microphones hidden beneath tables. Information on power fluctuations, which can help hackers determine what the computer is doing, can be measured by fake battery chargers plugged into power outlets adjacent to a laptop’s power converter.</p><p>Some signals can be picked up by a simple AM/FM radio, while others require more sophisticated spectrum analyzers.&nbsp; And computer components such as voltage regulators produce emissions that can carry signals produced elsewhere in the laptop.</p><p>As a demonstration, Zajic typed a simulated password on one laptop that was not connected to the Internet. On the other side of a wall, a colleague using another disconnected laptop read the password as it was being typed by intercepting side-channel signals produced by the first laptop’s keyboard software, which had been modified to make the characters easier to identify.</p><p>“There is nothing added in the code to raise suspicion,” said Milos Prvulovic, an associate professor in the Georgia Tech <a href="http://www.scs.gatech.edu/">School of Computer Science</a>. “It looks like a correct, but not terribly efficient version of normal keyboard driver software. And in several applications, such as normal spell-checking, grammar-checking and display-updating, the existing software is sufficient for a successful attack.”</p><p>Currently, there is no mention in the open literature of hackers using side-channel attacks, but the researchers believe it’s only a matter of time before that happens. The potential risks of side-channel emissions have been reported over the years, but not at the level of detail being studied by the Georgia Tech researchers.</p><p>“Of course, it’s possible that somebody is using it right now, but they are not sharing that information,” Zajic noted.</p><p>To counter the threat, the researchers are determining where the leaks originate.</p><p>“We are trying to understand why these side channels exist and what can be done to fix these leaks,” said Zajic. “We are measuring computers and smartphones to identify the parts of the devices that leak the most. That information can guide efforts to redesign them, and on an architectural level, perhaps change the instructions in the software to change the device behavior.”</p><p>Each computer operation has a different potential for leaking information. The processor draws different amounts of current depending on the operation, creating fluctuations that can be measured. Saving data to memory also requires a large amount of current, creating a “loud” operation.</p><p>“When you are executing instructions in the processor, you generate a different type of waveform than if you are doing things in memory,” explained Zajic. “And there is interaction between the two.”</p><p>To measure the vulnerability, Zajic, Prvulovic and graduate student Robert Callen developed a metric known as “signal available to attacker” (SAVAT), which is a measure of the strength of the signal emitted. They measured the level of SAVAT for 11 different instructions executed on three different laptops, and found the largest signals when the processors accessed off-chip memory.</p><p>“It is not really possible to eliminate all side-channel signal,” said Prvulovic. “The trick is to make those signals weak, so potential attackers would have to be closer, use larger antennas and utilize time-consuming signal analyses. We have found that some operations are much ‘louder’ than others, so quieting them would make it more difficult for attackers.”</p><p>The researchers are also now studying smartphones, whose compact design and large differential between idle and in-use power may make them more vulnerable. So far, they have only looked at Android devices.</p><p>Because the spying is passive and emits no signals itself, users of computers and smartphones wouldn’t know they’re being watched.</p><p>“If somebody is putting strange objects near your computer, you certainly should beware,” said Zajic. “But from the user’s perspective, there is not much they can do right now. Based on our research, we hope to develop something like virus scan software that will look for vulnerability in the code and tell developers what they should update to reduce this vulerability.”</p><p><em>This research has been supported, in part, by the National Science Foundation (NSF) under grant 1318934 and by the Air Force Office of Scientific Research (AFOSR) under grant FA9550-14-1-0223. The opinions expressed in this article are those of the authors and do not necessarily reflect the official views of the NSF or AFOSR.</em></p><p><strong>CITATION</strong>: Robert Callan, Alenka Zajic and Milos Prvulovic, “A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events,” (47th Annual IEEE/ACM International Symposium on Microarchitecture, 2014).<br /><br /><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong><br /><br /><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Brett Israel (404-385-1933) (<a href="mailto:brett.israel@comm.gatech.edu">brett.israel@comm.gatech.edu</a>).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1420726195</created>  <gmt_created>2015-01-08 14:09:55</gmt_created>  <changed>1475896670</changed>  <gmt_changed>2016-10-08 03:17:50</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are investigating the sources of information “leaks” that could provide information to hackers about what computers and cellphones are doing.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are investigating the sources of information “leaks” that could provide information to hackers about what computers and cellphones are doing.]]></sentence>  <summary><![CDATA[<p>If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wi-fi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits even when it’s not connected to the Internet.</p>]]></summary>  <dateline>2015-01-08T00:00:00-05:00</dateline>  <iso_dateline>2015-01-08T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-01-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>362141</item>          <item>362161</item>          <item>362151</item>          <item>362171</item>      </media>  <hg_media>          <item>          <nid>362141</nid>          <type>image</type>          <title><![CDATA[Measuring side-channel signals]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[em-snooping1229.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/em-snooping1229_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/em-snooping1229_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/em-snooping1229_0.jpg?itok=0vo4QGOT]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Measuring side-channel signals]]></image_alt>                    <created>1449245782</created>          <gmt_created>2015-12-04 16:16:22</gmt_created>          <changed>1475895098</changed>          <gmt_changed>2016-10-08 02:51:38</gmt_changed>      </item>          <item>          <nid>362161</nid>          <type>image</type>          <title><![CDATA[Listening to side-channel signals]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[em-snooping1184.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/em-snooping1184_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/em-snooping1184_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/em-snooping1184_0.jpg?itok=VUdBx9o-]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Listening to side-channel signals]]></image_alt>                    <created>1449245793</created>          <gmt_created>2015-12-04 16:16:33</gmt_created>          <changed>1475895098</changed>          <gmt_changed>2016-10-08 02:51:38</gmt_changed>      </item>          <item>          <nid>362151</nid>          <type>image</type>          <title><![CDATA[Measuring side-channel signals2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[em-snooping1225.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/em-snooping1225_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/em-snooping1225_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/em-snooping1225_0.jpg?itok=dWbFXqJ7]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Measuring side-channel signals2]]></image_alt>                    <created>1449245793</created>          <gmt_created>2015-12-04 16:16:33</gmt_created>          <changed>1475895098</changed>          <gmt_changed>2016-10-08 02:51:38</gmt_changed>      </item>          <item>          <nid>362171</nid>          <type>image</type>          <title><![CDATA[Milos Prvulovic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[em-snooping1270.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/em-snooping1270_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/em-snooping1270_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/em-snooping1270_0.jpg?itok=yXGVdOTo]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Milos Prvulovic]]></image_alt>                    <created>1449245793</created>          <gmt_created>2015-12-04 16:16:33</gmt_created>          <changed>1475895098</changed>          <gmt_changed>2016-10-08 02:51:38</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="168627"><![CDATA[side-channel]]></keyword>          <keyword tid="169697"><![CDATA[side-channel signals]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="350661">  <title><![CDATA[Computational tools will help identify microbes in complex environmental samples]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Microbes of interest to clinicians and environmental scientists rarely exist in isolation. Organisms essential to breaking down pollutants or causing illness live in complex communities, and separating one microbe from hundreds of companion species can be challenging for researchers seeking to understand environmental issues or disease processes.&nbsp;</p><p>A new National Science Foundation-supported project will provide computational tools designed to help identify and characterize the gene diversity of the residents of these microbial communities. The project, being done by researchers at the Georgia Institute of Technology and Michigan State University, will allow clinicians and scientists to compare the genomic information of organisms they encounter against the growing volumes of data provided by the world’s scientific community.</p><p>The tools will be hosted on a web server designed to be used by researchers who may not have training in the latest bioinformatics techniques. A prototype system containing a limited number of computational tools is already available at <a href="http://enve-omics.ce.gatech.edu">http://enve-omics.ce.gatech.edu</a> and is attracting more than 500 users each month.</p><p>“Across many areas of science, we are dealing with communities of microorganisms, and one challenge we’ve had is to identify them because we haven’t had good tools to tell apart individual microbes from the mixtures,” said <a href="http://www.ce.gatech.edu/people/faculty/711/overview">Kostas Konstantinidis</a>, an associate professor in the <a href="http://www.ce.gatech.edu/">School of Civil and Environmental Engineering</a> at Georgia Tech and the project’s principal investigator. “Our tools will be designed to deal with the genomes of whole communities of organisms.”</p><p>Current techniques identify individual microbes by examining their small subunit ribosomal RNA (SSU rRNA) genes, but the new tools will allow scientists to analyze entire genomes and meta-genomes.</p><p>“With the dawn of the genomic era, we can now get the whole genome of these organisms to see not only the ribosomal RNA, but also all the genes in the genome to get a better understanding of what the each organism’s potential might be,” said Konstantinidis. “There will be many advantages for looking at all the genes instead of just one, the SSU rRNA, such as to identify which organisms encode toxins or the enzymes for breaking down pollutants.”</p><p>Collaborators on the three-year project include scientists who operate the Ribosomal Database Project at Michigan State University: Jim Tiedje, director of Michigan State University’s Center for Microbial Ecology and James Cole, a Michigan State University research assistant professor and director of the Ribosomal Database Project.</p><p>The ability to identify and enumerate the organisms in complex communities using culture-independent, genomic technologies and associated bioinformatics algorithms is becoming more important as scientists study organisms that can’t be grown in the lab. The majority of the world’s organisms resist traditional lab culture, meaning they have to be studied in the field and identified through genetic information.</p><p>Konstantinidis and his research group are studying such communities in the water of lakes in Chattahoochee River system in Georgia and elsewhere. They are examining how these communities respond to perturbations, such as oil or pesticide spills, and the role that different members of the community play in breaking down pollutants.</p><p>“These tools actually come from our research practice,” said Konstantinidis. “We came to the point where we couldn’t process the data to answer the questions we wanted to ask. That led us to this new project to develop the tools we and others need to interrogate the data and get the information we are looking for.”</p><p>A single liter of lake water may contain as many as 500 different species, and together, their genomic information can total tens of billions of gene-coding letters. From Lake Lanier alone, the team has generated 200 gigabytes of genomic data.</p><p>“We want to figure out what organisms are there, and what genes they encode,” Konstantinidis explained. “The tools we are developing will allow us to do this.”</p><p>The tools developed in the project will be useful to both clinical microbiologists and environmental researchers. “This will not be specific to any one discipline,” he said. “As long as people are working with microbes, this will be helpful to them because some of the questions are universal.”</p><p>The system will also be built to provide user-friendly help to scientists who may not have training in the latest genomic and bioinformatics techniques. “There is a big need for big data analysis, and there are not many trained people right now,” Konstantinidis said. “These tools will make the lives of researchers easier.”</p><p>Among the challenges ahead is building an infrastructure able to handle the growing amounts of genomic information produced worldwide.</p><p>“We will have to develop some computational solutions for the problems of keeping up with all the new data becoming available,” said Konstantinidis. “We need to make tools that have high throughput to keep up with data volumes that are increasing geometrically.”</p><p>The system will initially operate on servers at Georgia Tech and Michigan State University, but if demand and data grow, additional resources may be sought, such as the National Science Foundation’s XSEDE supercomputer.</p><p><em>This research is supported by the National Science Foundation under award DBI-1356288. The opinions expressed in this article are those of the authors and do not necessarily reflect the official views of the National Science Foundation.</em></p><p><em>Kostas Konstantinidis is the Carlton S. Wilder Junior Faculty Professor in the Georgia Tech School of Civil and Environmental Engineering.</em></p><p><strong>Research News</strong></p><p><strong>Georgia Institute of Technology</strong></p><p><strong>177 North Avenue</strong></p><p><strong>Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p>&nbsp;</p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Brett Israel (404-385-1933) (<a href="mailto:brett.israel@comm.gatech.edu">brett.israel@comm.gatech.edu</a>).</p><p><strong>Write</strong>r: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1417434523</created>  <gmt_created>2014-12-01 11:48:43</gmt_created>  <changed>1475896657</changed>  <gmt_changed>2016-10-08 03:17:37</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new project will provide computational tools designed to help identify and characterize the gene diversity of the residents of microbial communities.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new project will provide computational tools designed to help identify and characterize the gene diversity of the residents of microbial communities.]]></sentence>  <summary><![CDATA[<p>A new project will provide computational tools designed to help identify and characterize the gene diversity of the residents of microbial communities. The project, being done by researchers at the Georgia Institute of Technology and Michigan State University, will allow clinicians and scientists to compare the genomic information of organisms they encounter against the growing volumes of data provided by the world’s scientific community.</p>]]></summary>  <dateline>2014-12-01T00:00:00-05:00</dateline>  <iso_dateline>2014-12-01T00:00:00-05:00</iso_dateline>  <gmt_dateline>2014-12-01 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>350641</item>          <item>350621</item>      </media>  <hg_media>          <item>          <nid>350641</nid>          <type>image</type>          <title><![CDATA[Microbial communities]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[microbial-genomics.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/microbial-genomics_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/microbial-genomics_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/microbial-genomics_0.jpg?itok=kcemVLhn]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Microbial communities]]></image_alt>                    <created>1449245702</created>          <gmt_created>2015-12-04 16:15:02</gmt_created>          <changed>1475895078</changed>          <gmt_changed>2016-10-08 02:51:18</gmt_changed>      </item>          <item>          <nid>350621</nid>          <type>image</type>          <title><![CDATA[Water sampling]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[water-sampling_0192.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/water-sampling_0192_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/water-sampling_0192_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/water-sampling_0192_0.jpg?itok=oO5wFmE5]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Water sampling]]></image_alt>                    <created>1449245702</created>          <gmt_created>2015-12-04 16:15:02</gmt_created>          <changed>1475894494</changed>          <gmt_changed>2016-10-08 02:41:34</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="154"><![CDATA[Environment]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="154"><![CDATA[Environment]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="807"><![CDATA[environment]]></keyword>          <keyword tid="12758"><![CDATA[Kostas Konstantinidis]]></keyword>          <keyword tid="7078"><![CDATA[microbe]]></keyword>          <keyword tid="111221"><![CDATA[microbial communities]]></keyword>          <keyword tid="51261"><![CDATA[microbial diversity]]></keyword>          <keyword tid="167864"><![CDATA[School of Civil and Environmental Engineering]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71911"><![CDATA[Earth and Environment]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="342491">  <title><![CDATA[Dynamic graph analytics tackle social media and other big data]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Today, petabytes of digital information are generated daily by such sources as social media, Internet activity, surveillance sensors, and advanced research instruments. The results are often referred to as “big data” – accumulations so huge that highly sophisticated computer techniques are required to identify useful information hidden within.</p><p>Graph analysis is a prime tool for finding the needle in the data haystack. This potent technology – not to be confused with simple illustrations like bar graphs and pie charts – utilizes mathematical techniques that represent relationships in the data more efficiently than traditional statistical analyses.&nbsp;</p><p>Researchers at the Georgia Tech Research Institute (GTRI) are bringing graph analytics to bear on a range of data-related challenges. They're developing advanced technology that can help investigate social networks, surveillance intelligence, computer-network functionality, industrial control systems, and more.</p><p>"Our first task is to look at the interesting properties of a graph – to find the important questions we can ask of that graph," said Dan Campbell, a GTRI principal research engineer who heads the High Performance Computing Branch. "The second task is to find the answers as quickly as possible, and then put them to practical use."</p><p>A graph is a type of data structure comprised of entities – meaning anything that can be represented digitally – and their relationships. In graph terminology, an entity is a vertex or a node; the connections between it and other vertices are edges or arcs. Graphs are constructed using software algorithms that represent both the data points and the relationships between them, and also enable computers to manipulate and analyze that information.</p><p>GTRI researchers make extensive use of a graph-analysis framework called STINGER, built specifically to tackle dynamic, ever-changing applications such as social networks and Internet traffic. STINGER was created by a team led by David A. Bader, a professor in the School of Computational Science and Engineering; key members of that team included David Ediger and Robert McColl, who are now part of Campbell's GTRI group. STINGER, which is open-source software (STINGERgraph.com), continues to be developed at Georgia Tech and in the broader graph analytics community.</p><p>"We've done a great deal of work on analyzing openly available social media in real time," said Ediger."Social media analysis clearly has an important role to play in emergency response to both natural disasters like Hurricane Sandy and to potential terrorist attacks, and we're actively researching applications in those areas, among others."</p><p>STINGER helps support GTRI’s focus on streaming or dynamic-graph technology, which can store very large databases and then update them in real time as new data come in. This novel approach allows users to monitor social media on a massive scale, and can also be utilized to simulate very large networks.&nbsp;</p><p>Georgia Tech researchers have presented this technology at several recent conferences including the 1st Workshop on Parallel Programming for Analytics Applications, which was held in February in Orlando, Fla., in conjunction with the 19th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming.</p><p>"Unlike traditional graph databases, STINGER’s streaming-graph technology lets us store very big graphs and analyze them at high speed using fairly modest computing capability," said Jason Poovey, a GTRI research scientist in Campbell's group. "In half a terabyte of main memory – a pretty reasonable size today – we can handle billions of nodes and edges. Our benchmark tests show we can represent, update and analyze a graph in real time that's essentially the size of all the data in Twitter."&nbsp;</p><p>GTRI is focusing on multiple efforts in which graph analysis plays a key role.&nbsp; These projects include:</p><ul><li>Behavioral Modeling and Computational Social Systems (BMCSS) Strategic Initiative – A GTRI team led by senior research scientist Erica Briscoe has used STINGER to study real-time social media analytics, as part of research aimed at predicting human behavior on a large scale. &nbsp;</li><li>BlackForest – Members of Campbell's group are using graph analytics to support the BlackForest project led by GTRI researcher Chris Smoak. The aim of this externally funded project involves forming coherent intelligence pictures from disparate types of data obtained from multiple sources. &nbsp;</li><li>Nextcache – This externally funded project focuses on developing new CPU, cache and memory designs tailored for graph-based applications.</li><li>Real-time Business Intelligence – Using streaming graph technology, members of Campbell’s group are working with GTRI researcher Erica Briscoe to develop a business-intelligence dashboard that monitors social media in real time and helps businesses gauge consumer sentiment.</li><li>XDATA – Working with researchers from the School of Computational Science and Engineering, GTRI senior research scientists Barry Drake and Richard Boyd are helping to address big-data challenges by studying the computational demands of processing machine-learning algorithms.</li></ul><p><br /><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong><br /><br /><strong>Media Relations Contacts</strong>: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986) or Brett Israel (<a href="mailto:brett.israel@comm.gatech.edu">brett.israel@comm.gatech.edu</a>) (404-385-1933).</p><p><strong>Writer</strong>: Rick Robinson<br /><br /><br /></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1415285258</created>  <gmt_created>2014-11-06 14:47:38</gmt_created>  <changed>1475896646</changed>  <gmt_changed>2016-10-08 03:17:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers at the Georgia Tech Research Institute (GTRI) are bringing graph analytics to bear on a range of data-related challenges.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers at the Georgia Tech Research Institute (GTRI) are bringing graph analytics to bear on a range of data-related challenges.]]></sentence>  <summary><![CDATA[<p>Researchers at the Georgia Tech Research Institute (GTRI) are bringing graph analytics to bear on a range of data-related challenges. They're developing advanced technology that can help investigate social networks, surveillance intelligence, computer-network functionality, industrial control systems, and more.</p>]]></summary>  <dateline>2014-11-06T00:00:00-05:00</dateline>  <iso_dateline>2014-11-06T00:00:00-05:00</iso_dateline>  <gmt_dateline>2014-11-06 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>342481</item>      </media>  <hg_media>          <item>          <nid>342481</nid>          <type>image</type>          <title><![CDATA[Graph analytics]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[graphanalytics1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/graphanalytics1_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/graphanalytics1_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/graphanalytics1_0.jpg?itok=VXjwrXll]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Graph analytics]]></image_alt>                    <created>1449245639</created>          <gmt_created>2015-12-04 16:13:59</gmt_created>          <changed>1475895062</changed>          <gmt_changed>2016-10-08 02:51:02</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="15092"><![CDATA[big data]]></keyword>          <keyword tid="438"><![CDATA[data]]></keyword>          <keyword tid="108871"><![CDATA[graph analytics]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>      </keywords>  <core_research_areas>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="310331">  <title><![CDATA[BlackForest Aggregates Threat Information to Warn of Possible Cyber Attacks]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Coordinating distributed denial-of-service attacks, displaying new malware code, offering advice about network break-ins and posting stolen information – these are just a few of the online activities of cyber-criminals. Fortunately, activities like these can provide cyber-security specialists with advance warning of pending attacks and information about what hackers and other bad actors are planning.</p><p>Gathering and understanding this cyber-intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the <a href="http://www.gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI). By using such information to create a threat picture, BlackForest complements other GTRI systems designed to help corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.</p><p>“BlackForest is on the cutting edge of anticipating attacks that may be coming,” said Christopher Smoak, a research scientist in GTRI’s Emerging Threats and Countermeasures Division. “We gather and connect information collected from a variety of sources to draw conclusions on how people are interacting. This can drive development of a threat picture that may provide pre-attack information to organizations that may not even know they are being targeted.”</p><p>The system collects information from the public Internet, including hacker forums and other sites where malware authors and others gather. Connecting the information and relating it to past activities can let organizations know they are being targeted and help them understand the nature of the threat, allowing them to prepare for specific types of attacks. Once attacks have taken place, BlackForest can help organizations identify the source and mechanism so they can beef up their security.</p><p>Organizing distributed denial-of-service (DDoS) attacks is a good example of how the system can be helpful, Smoak noted. DDoS attacks typically involve thousands of people who use the same computer tool to flood corporate websites with so much traffic that customers can’t get through. The attacks hurt business, harm the organization’s reputation, bring down servers – and can serve as a diversion for other types of nefarious activity.</p><p>But they have to be coordinated using social media and other means to enlist supporters. BlackForest can tap into that information to provide a warning that may allow an organization to, for example, ramp up its ability to handle large volumes of traffic.</p><p>“We want to provide something that is predictive for organizations,” said Ryan Spanier, head of GTRI’s Threat Intelligence Branch. “They will know that if they see certain things happening, they may need to take action to protect their networks.”</p><p>Malware authors often post new code to advertise its availability, seek feedback from other writers and mentor others. Analyzing that code can provide advance warning of malware innovations that will need to be addressed in the future.</p><p>“If we see a tool pop up written by a person who has been an important figure in the malware community, that lets us know to begin working to mitigate the new malware that may appear down the road,” Smoak said.</p><p>Organizations also need to track what’s being made available in certain forums and websites. When a company’s intellectual property starts showing up online, that may be the first sign that a network has been compromised. Large numbers of credit card numbers, or logins and passwords, can show that a website or computer system of a retail organization has been breached.</p><p>“You have to monitor what’s out in the wild that your company or organization owns,” said Spanier. “If you have something of value, you will be attacked. Not all attacks are successful, but nearly all companies have some computers that have been compromised in one way or another. You want to find out about these as soon as possible.”</p><p>Monitoring comments on websites can also reveal what kinds of security reputations organizations may have. If the advice is to avoid a particular organization because previous attacks have failed, that can give an organization a sense that its security is good. Attackers often seek the easiest targets, Spanier noted.</p><p>Individual organizations could gather the kinds of information monitored by BlackForest, but few organizations have the resources to connect the information. GTRI customizes the system to gather information specific to each user and their industry segment.</p><p>“The average organization doesn’t have the means to crawl all of this data and put together the complex algorithms needed to identify the useful information,” Smoak explained. “Because we have the environment and the connectivity, we have what we need to obtain this information.”</p><p>By automating much of the work involved in gathering and monitoring information, BlackForest can allow human resources to be used for more challenging information security activities.</p><p>“Our goal is to have tools that will help focus the resources so that the most valuable resources are used for the more difficult issues,” said Smoak. “Right now, we tend to find all kinds of security fires the same. This will help us focus on the most important threats.”</p><p>BlackForest joins two other GTRI cyber-security systems already available. Apiary is a malware intelligence system that helps corporate and government security officials share information about the attacks they are fighting. Phalanx helps fight the spear phishing attacks that are carried out by tricking email recipients to open malware-infected attachments or follow malicious web links.</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181</strong></p><p><strong>Media Relations Contacts</strong>: Lance Wallace (404-407-7280) (<a href="mailto:lance.wallace@gtri.gatech.edu">lance.wallace@gtri.gatech.edu</a>) or John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1406131544</created>  <gmt_created>2014-07-23 16:05:44</gmt_created>  <changed>1475896608</changed>  <gmt_changed>2016-10-08 03:16:48</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a new open source intelligence gathering system known as BlackForest.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a new open source intelligence gathering system known as BlackForest.]]></sentence>  <summary><![CDATA[<p>Researchers have developed a new open source intelligence gathering system designed to create a picture of developing threats. BlackForest complements other GTRI systems designed to help corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.</p>]]></summary>  <dateline>2014-07-23T00:00:00-04:00</dateline>  <iso_dateline>2014-07-23T00:00:00-04:00</iso_dateline>  <gmt_dateline>2014-07-23 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>310311</item>          <item>310321</item>      </media>  <hg_media>          <item>          <nid>310311</nid>          <type>image</type>          <title><![CDATA[BlackForest Aggregates Threats]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[black-forest109-m.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/black-forest109-m_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/black-forest109-m_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/black-forest109-m_0.jpg?itok=_QssycOf]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[BlackForest Aggregates Threats]]></image_alt>                    <created>1449244726</created>          <gmt_created>2015-12-04 15:58:46</gmt_created>          <changed>1475895020</changed>          <gmt_changed>2016-10-08 02:50:20</gmt_changed>      </item>          <item>          <nid>310321</nid>          <type>image</type>          <title><![CDATA[BlackForest Aggregates Threats1]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[black-forest259-m.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/black-forest259-m_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/black-forest259-m_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/black-forest259-m_0.jpg?itok=9WUwniKB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[BlackForest Aggregates Threats1]]></image_alt>                    <created>1449244726</created>          <gmt_created>2015-12-04 15:58:46</gmt_created>          <changed>1475895020</changed>          <gmt_changed>2016-10-08 02:50:20</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="98341"><![CDATA[BlackForest]]></keyword>          <keyword tid="98361"><![CDATA[Chris Smoak]]></keyword>          <keyword tid="344"><![CDATA[cyber]]></keyword>          <keyword tid="98381"><![CDATA[cyber-attack]]></keyword>          <keyword tid="9651"><![CDATA[cyber-security]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="856"><![CDATA[Intelligence]]></keyword>          <keyword tid="98351"><![CDATA[Ryan Spanier]]></keyword>          <keyword tid="3761"><![CDATA[threat]]></keyword>          <keyword tid="98371"><![CDATA[threat information]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="306071">  <title><![CDATA[Georgia Tech uses data science to promote social good]]></title>  <uid>27918</uid>  <body><![CDATA[<p>With the Atlanta city skyline behind them, three students in a new Georgia Institute of Technology summer internship program harvested spinach at the Truly Living Well farm.</p><p>The students talked with farmers and volunteers about the crops, planting schedules, harvest requests, visitor demographics and other data crucial to the daily operation.</p><p>Urban agriculture, the students realized, is a complex undertaking. Their challenge is to create a streamlined data management system for the farm and move them away from pencil and paper. Ideally, this system will allow the farm to increase productivity and move toward financial sustainability.</p><p>The student team is one of five working with non-profits and government agencies as part of the Data Science for Social Good internship program, sponsored by Georgia Tech and Oracle.</p><p>Sixteen students from around the country are participating in a 10-week paid internship program showing non-profits and government agencies how they can use data to tackle social and societal problems.</p><p>The program allows students to solve real-world problems instead of relying on sample data sets, said Ellen Zegura, the program director.</p><p>It also educates local non-profits on the need for better data systems, said Zegura, a professor in the School of Computer Science in the College of Computing at Georgia Tech.</p><p>“We are connecting those who collect data with the people who know how to turn the data into something meaningful that can have a positive impact,” she said.</p><p>The projects deal with safety, criminal justice, transportation and sustainability. The student teams are collaborating with the Atlanta Police Department, the city’s Community Courts, Cycle Atlanta, Georgia Tech Office of Information Technology and Truly Living Well.</p><p>Georgia Tech is piloting the program this year and hopes to grow it next year. The Atlanta internship is modeled after a similar program the University of Chicago started last year.</p><p>Raj Bandyopadhyay, principal data scientist with Pindrop Security, heard about the Chicago program at a conference and led the charge to bring it to Atlanta.</p><p>“So often when people hear of big data, they don’t understand how it can be used to improve their lives,” he said. “We are showing future data scientists how they can use their skills to address social issues.”</p><p>More than 80 students applied for the internship. The selected students come from eight colleges including: Carnegie Mellon University, Southern Methodist University, Emory University and Georgia Tech.</p><p>Umashanthi Pavalanathan, a Ph.D. student in computer science at Georgia Tech, is working with 911 data collected by the city. They are looking at the response time between calls and how to best use the dispatchers.</p><p>“I’m so used to dealing with abstract concepts and situations that it’s exciting to work with real clients on real issues,” she said. “You get a good feeling knowing that what we’re doing can help save somebody.”</p><p>Students from all five projects will present their findings and recommendations during a public demonstration and reception scheduled to begin at 6:30 p.m. on July 17 at Atlanta Tech Village. More information about the event and internship program can be found here: <a href="http://dssg-atl.io" title="http://dssg-atl.io">http://dssg-atl.io</a></p><p>The internship ends July 18, although the data will continue to reap benefits.</p>]]></body>  <author>Laura Diamond</author>  <status>1</status>  <created>1404135443</created>  <gmt_created>2014-06-30 13:37:23</gmt_created>  <changed>1475896601</changed>  <gmt_changed>2016-10-08 03:16:41</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Data Science for Social Good internship program is sponsored by Georgia Tech and Oracle.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Data Science for Social Good internship program is sponsored by Georgia Tech and Oracle.]]></sentence>  <summary><![CDATA[<p>Sixteen students from around the country are participating in a 10-week paid internship program showing non-profits and government agencies how they can use data to tackle social and societal problems.&nbsp;</p>]]></summary>  <dateline>2014-06-30T00:00:00-04:00</dateline>  <iso_dateline>2014-06-30T00:00:00-04:00</iso_dateline>  <gmt_dateline>2014-06-30 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Georgia Tech Media Relations<br />404-894-6016</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>      </media>  <hg_media>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="15092"><![CDATA[big data]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="92811"><![CDATA[data science]]></keyword>          <keyword tid="166941"><![CDATA[School of Computer Science]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="272041">  <title><![CDATA[How Politics Divide Facebook Friendships]]></title>  <uid>27560</uid>  <body><![CDATA[<p>Those who say one should never talk about politics in mixed company have never logged on to Facebook. These days a typical newsfeed is peppered with links, opinions and jabs about the latest political topics.</p><p>A <a href="https://dl.dropboxusercontent.com/u/15504661/paper430.pdf">new study</a> from the Georgia Institute of Technology suggests that politics are the great divider. People who think the majority of their friends have differing opinions than their own engage less on Facebook. For those who choose to stay logged in and politically active, the research found that most tend to stick in their own circles, ignore those on the other side and become more polarized.</p><p>At the same time, the study suggests a few design changes that could allow the social media platform to bridge political differences. By displaying shared interests between friends during their prickly conversations, Facebook could help diffuse possible arguments and alleviate tension. The research also notes that increasing exposure and engagement to weak ties could make people more resilient in the face of political disagreement.</p><p>“People are mainly friends with those who share similar values and interests. They tend to interact with them the most, a phenomenon called homophily,” said Catherine Grevet, the Georgia Tech Ph.D. student who led the study. “But that means they rarely interact with the few friends with differing opinions. As a result, they aren’t exposed to opposing viewpoints.”</p><p>Facebook’s algorithms don’t help the cause. Newsfeeds are filled with the friends a person most often interacts with, typically those with strong ties. Grevet suggests that the social media site should sprinkle in a few status updates on both sides of political issues. That would expose people to different opinions, which are typically held by weak ties.</p><p>“Designing social media toward nudging users to strengthen relationships with weak ties with different viewpoints could have beneficial consequences for the platform, users and society,” said Grevet.</p><p>The study surveyed more than 100 politically active Facebook users in the spring of 2013 amid debates about budgets cuts, gay marriage and gun control regulations. The majority of participants were liberal, female and under the age of 40, mirroring the traditional Facebook user. More than 70 percent said they don’t talk about politics with their friends with different opinions. When they saw something they didn’t agree with, 60 percent said they ignored it and didn’t comment. When they did, sometimes it made the person question the relationship and disassociate and from the friend.</p><p>“Even though people could simply unfriend someone with different opinions, and there were certainly those who did that, there were many relationships that were able to be maintained,” said Grevet. “Through a combination of behaviors on Facebook like hiding, tuning out, logging off or avoiding certain conversations, people negotiated around those differences to stay connected.”</p><p>That’s why she feels social media sites like Facebook could support those relationships better, for instance, by highlighting shared interests between acquaintances.</p><p>Grevet will present the study in February at the <a href="mailto:http://cscw.acm.org/">Computer Supported Cooperative Work and Social Computing</a> conference in Baltimore. Her advisor is Eric Gilbert, an assistant professor in Georgia Tech’s School of Interactive Computing, who has recently <a href="http://www.news.gatech.edu/2012/06/06/have-you-heard-nearly-15-percent-work-email-gossip">studied office gossip</a> and <a href="http://www.news.gatech.edu/2014/01/14/georgia-tech-researchers-reveal-phrases-pay-kickstarter">successful phrases on Kickstarter</a>.</p><p>&nbsp;</p>]]></body>  <author>Jason Maderer</author>  <status>1</status>  <created>1390997258</created>  <gmt_created>2014-01-29 12:07:38</gmt_created>  <changed>1475896547</changed>  <gmt_changed>2016-10-08 03:15:47</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Study examines how politically active Facebook users interact with some but ignore others.]]></teaser>  <type>news</type>  <sentence><![CDATA[Study examines how politically active Facebook users interact with some but ignore others.]]></sentence>  <summary><![CDATA[<p>A <a href="https://dl.dropboxusercontent.com/u/15504661/paper430.pdf">new study</a> suggests that politics are the great divider on social media. People who think the majority of their friends have differing opinions than their own engage less on Facebook. For those who choose to stay logged in and politically active, the research found that most tend to stick in their own circles, ignore those on the other side and become more polarized.</p>]]></summary>  <dateline>2014-01-29T00:00:00-05:00</dateline>  <iso_dateline>2014-01-29T00:00:00-05:00</iso_dateline>  <gmt_dateline>2014-01-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Study suggests ways social media site could bridge political divide]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[maderer@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jason Maderer<br />Media Relations<br /><a href="mailto:maderer@gatech.edu">maderer@gatech.edu</a><br />404-385-2966</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>      </media>  <hg_media>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.cc.gatech.edu/]]></url>        <title><![CDATA[College of Computing]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="13342"><![CDATA[Eric Gilbert]]></keyword>          <keyword tid="10835"><![CDATA[Facebook]]></keyword>          <keyword tid="3177"><![CDATA[politics]]></keyword>          <keyword tid="114601"><![CDATA[Press Release]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="270001">  <title><![CDATA[Novel Collaborative Software Helps Systems Engineers Link Performance and Cost]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Today's modeling and simulation (M&amp;S) software provides indispensable tools for systems engineering challenges. Such programs allow investigators to experiment with "what-ifs" by adjusting design parameters and examining potential outcomes.</p><p>A team from the <a href="http://www.gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI) has produced an advanced web-based tool that lets physically separated participants collaborate on model-based systems engineering projects. Known as the Framework for Assessing Cost and Technology (FACT), the program utilizes open-source software components to allow users to visualize a system's potential expense alongside its performance, reliability and other factors.</p><p>The research is sponsored by the U.S. Marine Corps Systems Command (MCSC). The work was most recently reported in March in the Proceedings of the 11th Conference on Systems Engineering Research.</p><p>The FACT tool enables users to pull all aspects of a project into a single modeling and simulation process, explained Tommer Ender, a GTRI senior research engineer who co-leads the effort.</p><p>"The FACT framework lets multiple users work together online to create entire systems, including complex technology systems," Ender said. "All they need is access to a web browser."&nbsp;</p><p>FACT's features include:</p><ul><li>Capacity to weigh cost along with performance factors;</li><li>Adaptability to a wide range of systems engineering problems;</li><li>Ability to track the entire collaborative process;</li><li>Advanced security and configurability features;</li><li>Collaboration among any systems engineering platforms with web access.</li></ul><p>FACT is currently in use at the GTRI field office in Quantico, Va., located on the Quantico Marine Corps Base. There, senior research engineers Jim Bertoglio and Ron Smith are working with Marine Corps personnel to maximize the software's effectiveness.</p><p>Inside the GTRI facility, a dedicated conference room with six large high definition screens provides highly reconfigurable work areas. The screens function individually or together, while notes handwritten on a linked screen can instantly become electronic text that supports the online collaboration.&nbsp;</p><p><strong> Modeling Multiple Factors</strong></p><p>Modeling and simulation software, Ender explained, has traditionally been used to address performance issues. For instance, M&amp;S tools allow researchers to investigate the capabilities of air or ground vehicles, or radar systems' effectiveness against hostile action.</p><p>"These tools do an excellent job of answering the 'how fast, how well' questions, but we rarely see them working in either collaborative or cost-aware environments," he said.</p><p>With FACT, online users can take advantage of a technique called trade-space analysis, which allows them to juggle performance, cost and other factors, said Daniel Browne, a research engineer who leads the project for GTRI. For example, users examining vehicle convoy logistics could investigate the complex interrelationship of vehicles, personnel, supplies and cost to pinpoint optimal combinations.</p><p>"We can select parameters for each component down to the desired level of detail, and then experiment with trade-offs at the attribute level," Browne said. "Suppose I use FACT to adjust the number of convoy personnel per HUMVEE to increase fuel efficiency. I can then turn around and look at how that change affects the number of convoys I can field, and what the ultimate cost savings is."</p><p>FACT's collaborative capabilities include security and usability functions that are highly configurable, he said. If, for instance, a given user is responsible only for budgetary considerations, administrators could limit that person to just the model's cost portions.&nbsp;</p><p>Users can create entire technical models outside the FACT framework, and then introduce those models into the collaborative arena for team-wide consideration. In all cases, administrators can go back and trace each part of the work, including where it came from and what happened after it came into the system.</p><p><strong>A Multi-Project Tool&nbsp;</strong></p><p>Ender stressed the point that FACT's modeling capabilities can be applied to many different types of projects. The GTRI development team has already used it to address systems engineering questions relating to ships, satellites and ground vehicles.</p><p>"In the past, it's been very challenging to re-use modeling and simulation tools," he said. "You could build a big beautiful tool for a customer, but when the customer came in with a different problem, you had to start again from scratch."</p><p>A major factor in FACT's portability is that its building blocks are both flexible and familiar. They're based on open-source software standards and recognized approaches to systems engineering processes.</p><p>For instance, the FACT toolkit utilizes the Systems Modeling Language (SysML), an open-source modeling language widely used in systems engineering applications. SysML supports design, analysis and validation of many different kinds of systems development.</p><p>The FACT tool itself will likely be limited to military use, Browne said. But software frameworks similar to FACT offer promise for future applications that could support both academic and commercial systems engineering needs.</p><p>"The ultimate goal is to have a reusable model-based systems engineering tool in hand, available for a wide range of customer needs," he said. "Having such a tool lets us spend our time and effort improving the quality of the domain-specific information that goes into the model itself, rather than having to reinvent the modeling tool we're using."</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181</strong><br /><br /><strong>Media Relations Assistance</strong>: Lance Wallace (<a href="mailto:lance.wallace@gtri.gatech.edu">lance.wallace@gtri.gatech.edu</a>) (404-407-7280) or John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986).</p><p><strong>Writer</strong>: Rick Robinson<br /><br /></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1390339019</created>  <gmt_created>2014-01-21 21:16:59</gmt_created>  <changed>1475896544</changed>  <gmt_changed>2016-10-08 03:15:44</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[An advanced web-based tool allows collaboration on systems engineering projects.]]></teaser>  <type>news</type>  <sentence><![CDATA[An advanced web-based tool allows collaboration on systems engineering projects.]]></sentence>  <summary><![CDATA[<p>Researchers have developed an advanced web-based tool that allows geographically separated participants to collaborate on systems engineering projects.</p>]]></summary>  <dateline>2014-01-22T00:00:00-05:00</dateline>  <iso_dateline>2014-01-22T00:00:00-05:00</iso_dateline>  <gmt_dateline>2014-01-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>269991</item>      </media>  <hg_media>          <item>          <nid>269991</nid>          <type>image</type>          <title><![CDATA[FACT Development Team]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fact5.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fact5_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fact5_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fact5_0.jpg?itok=IIam-tj3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[FACT Development Team]]></image_alt>                    <created>1449244077</created>          <gmt_created>2015-12-04 15:47:57</gmt_created>          <changed>1475894959</changed>          <gmt_changed>2016-10-08 02:49:19</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="340"><![CDATA[collaboration]]></keyword>          <keyword tid="823"><![CDATA[design]]></keyword>          <keyword tid="84491"><![CDATA[FACT]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="84481"><![CDATA[modeling &amp; simulation]]></keyword>          <keyword tid="167642"><![CDATA[systems engineering]]></keyword>          <keyword tid="84501"><![CDATA[Tommer Ender]]></keyword>      </keywords>  <core_research_areas>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="231301">  <title><![CDATA[Georgia Tech Team Supports Open Architecture Software Standards for Military Avionics]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Researchers at the Georgia Institute of Technology are helping the U.S. military make key changes in how aircraft electronic systems, called avionics, are produced. The effort focuses on modifying the design of avionics software, especially the ways in which it interfaces with an aircraft's hardware and other software.</p><p>The work is part of the U.S. Navy's Future Airborne Capability Environment (FACE™) project. The Navy’s FACE team is working with the FACE consortium, a government, industry and academia consortium managed by The Open Group®, to develop a new technical standard that governs how avionics software communicates with other avionics software and hardware components – to control aircraft sensors, effectors and other mission critical systems to deliver warfighting capability.&nbsp;</p><p>Georgia Tech’s support of the FACE project is funded by the Naval Air Systems Command (NAVAIR) Air Combat Electronics Program Office (PMA-209) and the U.S. Army Aviation and Missile Research Development and Engineering Center (AMRDEC). Georgia Tech's work principally involves validating and maturing the FACE Technical Standard by producing reference software built according to the new FACE standards.&nbsp;</p><p>"The FACE standard lets us streamline software production and software upgrades, which are vital for keeping U.S. pilots safe and delivering our military capabilities," said Douglas Woods, a research scientist leading the work at the <a href="http://www.gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI), Georgia Tech’s applied research arm. "In tackling this important work, we created a one-Georgia Tech team, uniting expertise from both GTRI and the <a href="http://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a>.</p><p>“Basically, the FACE standard dictates how everything should fit together,” Woods said. “The FACE Technical Standard lets developers connect software and hardware in a uniform way, so that one software application can work with a variety of different hardware.”</p><p>The digital control portion of an avionics system is similar in some ways to the familiar personal computer, explained Woods, who is working on the FACE project with professor George Riley of the School of Electrical and Computer Engineering. That's because both computers and avionics use application software that runs on processing hardware; the application software communicates with the hardware via intermediary software known as an operating system.</p><p>Unlike a PC, however, the application software and operating system of an avionics system are very compact and robust for safety, security and performance reasons.&nbsp;</p><p>For decades, these embedded applications have been uniquely designed to work with the specific operating system and hardware components contained in a given avionics system. Thus, the application software embedded in an avionics device worked with that device only, requiring significant rework or redundant development when similar capability is needed on new hardware or different hardware from another source.</p><p>This specialized software has also resulted in software modification having to be performed by the company or companies that created the software/hardware combination in the first place, reducing the opportunity for future competition.</p><p>That's where the FACE concept comes in. The FACE architecture specifies that designers use application programming interfaces (APIs) that are essentially a standardized software layer that translates between the application on one level and the other software applications, the operating system and hardware at other levels. The result is that designers can readily modify application software, integrate it back into the system, and expect it to work.&nbsp;&nbsp;</p><p>"As long as you adhere to the standard software interfaces specified in the FACE Technical Standard, then changing the embedded application software to add capability to the system becomes straightforward," Woods said. "Any competent software engineer should be able to write an application that can talk to those interfaces, and that makes it possible to add in new capabilities quickly and easily."</p><p>Georgia Tech expects to be involved in tests that will demonstrate to the Navy the portability of capabilities using the FACE Technical Standard, he added.</p><p>The FACE Technical Standard takes advantage of the Portable Operating System Interface (POSIX), a group of open software standards aimed at making applications compatible with various operating systems. POSIX uses a uniform application programming interface (API), command line shells and utility interfaces that promote software compatibility among Unix, Linux and other Unix-like operating systems.</p><p>Georgia Tech has been working with the Navy FACE team for more than two years on the development of software code that provides an interface built to the FACE standard. Vanderbilt University, which is also involved in the effort, is creating a software developers' toolkit and conformance tools to be used with the FACE Technical Standard.&nbsp;</p><p>"Our Georgia Tech/GTRI team has been successful in producing a FACE infrastructure prototype that is POSIX conformant and adheres fully to the standards developed by the FACE consortium," Riley said. "From a technical standpoint, this software can do the job that was assigned, which is to allow applications that conform to the FACE APIs to be interchangeable."</p><p>A contract that requires use of the FACE Technical Standard, Edition 1.0, in the Navy's C-130T aircraft has already been awarded, Woods said. The FACE Technical Standard, Edition 2.0, was recently released, and the FACE consortium is currently developing Edition 3.0 of the standard.&nbsp;</p><p>The Navy's FACE team has been recognized with several awards, including two Naval Air Warfare Center, Aircraft Division (NAWCAD) Commander’s Awards, a NAWCAD Innovation Award, and the Defense Standardization Program Achievement Award.</p><p>"The FACE initiative represents a major step forward in rapidly integrating new capabilities for a variety of airborne defense systems," said Capt. Tracy Barkhimer, program manager for PMA-209. "The FACE initiative has benefited greatly from NAVAIR's partnership with Georgia Tech and Vanderbilt. They have brought a wealth of knowledge and experience that has been vital to the validation and rapid maturation of the FACE Technical Standard."&nbsp;</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181</strong><br /><br /><strong>Media Relations Contacts</strong>: Lance Wallace (<a href="mailto:lance.wallace@gtri.gatech.edu">lance.wallace@gtri.gatech.edu</a>)(404-407-7280) or John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>)(404-894-6986).</p><p><strong>Writer</strong>: Rick Robinson<br /><br /></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1377204202</created>  <gmt_created>2013-08-22 20:43:22</gmt_created>  <changed>1475896486</changed>  <gmt_changed>2016-10-08 03:14:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are helping the U.S. military change the way aircraft avionics are produced.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are helping the U.S. military change the way aircraft avionics are produced.]]></sentence>  <summary><![CDATA[<p>Researchers at the Georgia Institute of Technology are helping the U.S. military make key changes in how aircraft electronic systems, called avionics, are produced. The effort focuses on modifying the design of avionics software, especially the ways in which it interfaces with an aircraft's hardware and other software.</p>]]></summary>  <dateline>2013-08-22T00:00:00-04:00</dateline>  <iso_dateline>2013-08-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2013-08-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>231281</item>          <item>231291</item>      </media>  <hg_media>          <item>          <nid>231281</nid>          <type>image</type>          <title><![CDATA[Open Source Software for Avionics]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[face1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/face1_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/face1_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/face1_0.jpg?itok=7EwWA8rX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Open Source Software for Avionics]]></image_alt>                    <created>1449243602</created>          <gmt_created>2015-12-04 15:40:02</gmt_created>          <changed>1475894903</changed>          <gmt_changed>2016-10-08 02:48:23</gmt_changed>      </item>          <item>          <nid>231291</nid>          <type>image</type>          <title><![CDATA[Open Source Software for Avionics2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[face2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/face2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/face2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/face2_0.jpg?itok=HPD0W0t6]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Open Source Software for Avionics2]]></image_alt>                    <created>1449243602</created>          <gmt_created>2015-12-04 15:40:02</gmt_created>          <changed>1475894903</changed>          <gmt_changed>2016-10-08 02:48:23</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="136"><![CDATA[Aerospace]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="136"><![CDATA[Aerospace]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="72211"><![CDATA[avionics]]></keyword>          <keyword tid="72241"><![CDATA[Douglas Woods]]></keyword>          <keyword tid="72221"><![CDATA[FACE]]></keyword>          <keyword tid="5430"><![CDATA[George Riley]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="72231"><![CDATA[military electronics]]></keyword>          <keyword tid="5155"><![CDATA[open source]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="166855"><![CDATA[School of Electrical and Computer Engineering]]></keyword>          <keyword tid="167449"><![CDATA[software]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="228181">  <title><![CDATA[National Pilot Project Uses Information to Improve Cancer Treatment]]></title>  <uid>27303</uid>  <body><![CDATA[<p>An experimental health information exchange being tested in the north Georgia city of Rome is helping Koren Sinnock keep her travel plans. A breast cancer patient, Sinnock had been reluctant to travel very far from her doctors until the new program promised to provide access to her medical records from anywhere she might happen to be – including the beach.</p><p>“It gives me a sense of freedom that I can actually leave town and know that I can have medical information related to my cancer with me,” she said. “I’m excited to be part of creating something that other people across the country might use.”</p><p>Providing easy access to medical histories and treatment records is just one aspect of MyJourney Compass, a pilot project designed to help patients navigate the complex cancer treatment process and become more involved their health care decisions. Operated through the <a href="http://dch.georgia.gov/">Georgia Department of Community Health</a>, the project resulted from collaboration that includes two hospitals, a doctor’s group and cancer support organizations in Rome. The overall project, funded by the federal <a href="http://www.healthit.gov/newsroom/about-onc">Office of the National Coordinator for Health Information Technology (ONC)</a>, is managed by health information specialists at the Georgia Institute of Technology.</p><p>“This really has the potential for making people’s lives better through education and knowledge, which empowers people,” said Phil Lamson, a health care consultant with Georgia Tech’s <a href="http://innovate.gatech.edu/">Enterprise Innovation Institute</a>. “Using MyJourney Compass, patients can have more direct communication with their providers on the common symptoms that often accompany this disease.”</p><p>MyJourney Compass represents the merger of coordinated community cancer care with technology. Rome already had a coordinated, integrated and centralized cancer care system that helps patients navigate the often confusing network of doctors and treatment options. The program’s hardware technology – inexpensive Nexus 7 tablet computers connected to a secure network – helps patients communicate with health care providers, access their health information and obtain credible information on the Internet.</p><p>A symptom tracker application developed at Georgia Tech and loaded on each tablet allows patients to provide frequent feedback to health care providers when necessary. For a patient prescribed a new pain medication, for example, the app may ask for updates several times a day to help the doctor judge whether the drug is doing what’s needed.</p><p>“Doctors know what they need to track, and when the patients report in periodically, there can be an intervention early if there is some deviation from what’s expected,” Lamson explained. “If more frequent communication between scheduled appointments prevents a trip to the emergency room or admission to the hospital, that’s a big benefit for everybody.”&nbsp; &nbsp;</p><p>The project is funded by a federal challenge grant designed to encourage new health information technology applications. The pilot project launched officially on August 12.</p><p>“The project is funded by a $1.7 million grant from ONC through the Department of Community Health (DCH),” noted Kelly Gonzalez, health information technology coordinator for DCH. “It is one of ten challenge grants awarded by ONC to projects across the country, and is one of only two focusing on health care consumers.”</p><p>Rome was chosen for the national pilot project because the community had already come together to fight cancer. Collaboration among the community’s health care providers made it easier to launch the study.</p><p>“Everyone is amazed at the level of cooperation in our community,” said Gena Agnew, president of the <a href="http://www.nwgacancer.org/">Northwest Georgia Regional Cancer Coalition</a> (NWGRCC). “Here we have a private physician’s clinic with a standalone cancer center, a private and public hospital, a group of patient navigators and the NWGRCC. The cooperation is so well known that we were the first community considered for participation in this.”</p><p>Collaborators in Rome include Floyd Medical Center, the Redmond Regional Medical Center, the Harbin Clinic, Cancer Navigators and the NWGRCC. At the state level, the project involves the Georgia Department of Community Health and Georgia Tech. Within Georgia Tech, the project includes specialists from the Enterprise Innovation Institute, Georgia Tech Research Institute, College of Computing, and Institute for People and Technology.</p><p>MyJourney Compass uses established technology to provide electronic access to patient records, which are housed in Microsoft’s secure online HealthVault service. Secure email is provided through GeorgiaDirect, a service provided as part of the Georgia Health Information Network operated by DCH. The symptom tracker app was developed by Georgia Tech’s Interoperability and Integration Innovation Lab (I3L).</p><p>So far, 25 patients have signed up to use the system, and Lamson hopes as many as 100 breast cancer patients will be using the information exchange once the program is in full operation. Georgia Tech will be evaluating the patient outcomes and studying patient satisfaction.</p><p>Sinnock is already pleased with the 12-ounce tablet computer, which replaces a pile of printed materials she was given along with her diagnosis. “They handed me stacks of papers, handouts and books,” she confessed. “I just stuck it all in the closet and didn’t even look at it because that giant pile of information was just too overwhelming.”</p><p>The team implementing MyJourney Compass expects that the pilot project will demonstrate new ways of leveraging technology in health care and be applicable to treatment of other types of disease, including chronic health problems, hypertension and diabetes.</p><p>“The MyJourney Compass project is empowering patients to become actively engaged in their care, an important requirement of our consumer-focused State HIE Challenge Grants,” said Kory Mertz, challenge grant program manager at ONC in Washington, D.C. “The work in Rome will serve as a model to other patients, providers and communities across the country on leveraging health information technology to engage patients in their care.”<br /><br /><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong><br /><br /><strong>Media Relations Contact</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1376152311</created>  <gmt_created>2013-08-10 16:31:51</gmt_created>  <changed>1475896482</changed>  <gmt_changed>2016-10-08 03:14:42</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[An experimental health information exchange is helping breast cancer patients access their health information.]]></teaser>  <type>news</type>  <sentence><![CDATA[An experimental health information exchange is helping breast cancer patients access their health information.]]></sentence>  <summary><![CDATA[<p>An experimental health information exchange being tested in the north Georgia city of Rome is helping breast cancer patients access their health information and stay in touch with their doctors. The program, MyJourney Compass, is designed to help patients become more involved their health care decisions.</p>]]></summary>  <dateline>2013-08-12T00:00:00-04:00</dateline>  <iso_dateline>2013-08-12T00:00:00-04:00</iso_dateline>  <gmt_dateline>2013-08-12 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>228171</item>          <item>228151</item>          <item>228161</item>      </media>  <hg_media>          <item>          <nid>228171</nid>          <type>image</type>          <title><![CDATA[MyJourney Compass Tablet Computer]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[tablet.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/tablet_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tablet_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/tablet_0.jpg?itok=CIo7XVY5]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[MyJourney Compass Tablet Computer]]></image_alt>                    <created>1449243582</created>          <gmt_created>2015-12-04 15:39:42</gmt_created>          <changed>1475894901</changed>          <gmt_changed>2016-10-08 02:48:21</gmt_changed>      </item>          <item>          <nid>228151</nid>          <type>image</type>          <title><![CDATA[Koren_Sinnock]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[koren_sinnock.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/koren_sinnock_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/koren_sinnock_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/koren_sinnock_0.jpg?itok=V2pT40V8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Koren_Sinnock]]></image_alt>                    <created>1449243582</created>          <gmt_created>2015-12-04 15:39:42</gmt_created>          <changed>1475894901</changed>          <gmt_changed>2016-10-08 02:48:21</gmt_changed>      </item>          <item>          <nid>228161</nid>          <type>image</type>          <title><![CDATA[Georgia Tech and DCH]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[lamson-dch.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/lamson-dch_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/lamson-dch_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/lamson-dch_0.jpg?itok=Pwx3NXpt]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Georgia Tech and DCH]]></image_alt>                    <created>1449243582</created>          <gmt_created>2015-12-04 15:39:42</gmt_created>          <changed>1475894901</changed>          <gmt_changed>2016-10-08 02:48:21</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="140"><![CDATA[Cancer Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="140"><![CDATA[Cancer Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="385"><![CDATA[cancer]]></keyword>          <keyword tid="3671"><![CDATA[Enterprise Innovation Institute]]></keyword>          <keyword tid="41981"><![CDATA[health information]]></keyword>          <keyword tid="71261"><![CDATA[I3L]]></keyword>          <keyword tid="6587"><![CDATA[medical records]]></keyword>          <keyword tid="71231"><![CDATA[MyJourney Compass]]></keyword>          <keyword tid="71251"><![CDATA[Phil Lamson]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="203771">  <title><![CDATA[Project Will Improve Heat Dissipation in 3-D Microelectronic Systems]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Researchers from the Georgia Institute of Technology have won a Defense Advanced Research Projects Agency (DARPA) contract to develop three-dimensional chip-cooling technology able to handle heat loads as much as ten times greater than systems commonly used today.</p><p>In addition to higher overall chip heat dissipation demands, the new approach will also have to handle on-chip hot-spots that dissipate considerably more power per unit area than the remainder of the device. Such cooling demands may be needed for future generations of high-performance integrated circuits embedded in a wide range of military equipment.</p><p>“There is really no good way to address this heat dissipation need with existing technology, and the problem is getting worse because computing power is increasing and the capabilities being put on chips are expanding,” said Yogendra Joshi, a professor in Georgia Tech’s Woodruff School of Mechanical Engineering and the project’s principal investigator. “There is a real need for developing schemes that can address high power on the whole chip coupled with very high power dissipation areas that are only a few millimeters square.”</p><p>DARPA’s Microsystems Technology Office, which provided the three-year $2.9 million contract, is seeking techniques to dissipate heat of as much as one kilowatt per square centimeter in the overall integrated circuit, and five kilowatts per square centimeter on smaller areas. The research is part of DARPA’s Intrachip/Interchip Enhanced Cooling (ICECool) program.</p><p>“The approaches that we are talking about are relatively high-risk,” said Joshi, who specializes in electronic cooling from the chip-level on up to full-sized data centers. “They have not been tried before, so there are real questions of reliability – whether they can hold up under repeated cycles of being powered up and powered down.”</p><p>In addition to Joshi, the research team includes:</p><ul><li>Muhannad Bakir, an associate professor in the Georgia Tech School of Electrical and Computer Engineering, who specializes in three-dimensional interconnected systems;</li><li>Andrei Fedorov, a professor in the Georgia Tech School of Mechanical Engineering, who specializes in understanding and utilizing unique physical properties at the nanoscale, and</li><li>Suresh Sitaraman, also a professor in the Georgia Tech School of Mechanical Engineering, who specializes in evaluating electronic device reliability through innovative characterization techniques and physics-based modeling.</li></ul><p>While applications for the high-powered chips aren’t specified, their installation in systems intended for field use will add to the level of challenge.</p><p>“For speed and performance issues, this computing power may be embedded where it is needed in the field,” Joshi said. “The challenges of cooling these high performance integrated circuits will be even more challenging because they will operate in environments that may be adverse compared to an office or computer room situation.”</p><p>Among the significant challenges ahead are:</p><ul><li>Implementing non-uniform cooling using liquid evaporation in three dimensional integrated circuits. The program calls for two dies to be cooled together, but the approaches developed for that could be used in multiple stacked dies. Being able to cool smaller areas with higher heat dissipation needs will provide an additional challenge.</li><li>Meeting reliability standards while ensuring that the coolant and vaporization within tiny microfluidic passages does not induce liquid dry-out, passage cracking, fluid leakage or undesirable electronic performance.</li><li>Fabricating micron-scale cooling structures smaller than the thickness of a hair in the integrated circuit stack and understanding the flow and heat transfer physics taking place at that scale.</li></ul><p>“It is well known that cooling constraints play a critical role in designing electronic systems,” said Bakir. “Often a favorable electronic system configuration may not be realizable due to lack of adequate cooling. The novel microscale thermal technologies that will result from this project will address the most demanding thermal needs of future heterogeneous 3-D nanoelectronic systems and will enable new levels of performance and energy efficiency.”</p><p>Beyond the technology challenges, the researchers will also need to develop a detailed and fundamental understanding of how liquids boil at the micron size scale.</p><p>“The physics of how liquids boil has been well studied for large systems such as power plant boilers,” Joshi noted. “What we are talking about here is boiling that will take place in passages that are produced by microfabrication techniques that may be only 50 micrometers by 50 micrometers. The physics of what will be going on there is very different than what happens at the large scale, and how these liquids boil in the passages of interest will result in new scientific insights.”</p><p>Selecting an appropriate coolant able to provide the necessary phase change performance – while not damaging the silicon chips – will be part of the project. In an earlier research program supported by the Office of Naval Research, Georgia Tech developed new coolant candidates that will be considered along with traditional dielectric fluids.</p><p>The research will be done in collaboration with industry partner Rockwell-Collins, a major manufacturer of electronic systems for the military. That collaboration will help ensure that solutions developed will be compatible with defense system requirements.</p><p>“The challenges for material characterization and physics-based modeling are to consider the larger features of the electronic system without overlooking the micrometer and sub-micrometer scale features that are the main locations for fracture and failure,” said Sitaraman. “Mechanical characterization and physics-based modeling will be important to understanding the reliability of microelectronic systems operating with fluid passages.”</p><p>Beyond meeting the project requirements, the research will produce technology advances that should be broadly useful for future microsystems.</p><p>“The technologies we have proposed aim to explore uncharted territory in multiple science and technology domains to bring about an order-of-magnitude improvement in the current state-of-the-art,” said Fedorov. “The project represents a significant challenge on the most fundamental level of materials and fluid behavior down to the sub-micron scale. We’re confident that this project will produce some really new technologies to address the needs of future 3-D microsystems.”</p><p><em>This research is supported by the Defense Advanced Research Projects Agency (DARPA) under contract HR0011-13-2-0008. Any conclusions or opinions expressed in this article are those of the principal investigator and do not necessarily represent the official views of DARPA.</em></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181</strong><br /><br /><strong>Media Relations Contact</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>).</p><p><strong>Writer</strong>: John Toon<br /><br /></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1364896144</created>  <gmt_created>2013-04-02 09:49:04</gmt_created>  <changed>1475896439</changed>  <gmt_changed>2016-10-08 03:13:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new DARPA grant will fund development of 3-D technology able to cool future generations of microsystems.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new DARPA grant will fund development of 3-D technology able to cool future generations of microsystems.]]></sentence>  <summary><![CDATA[<p>Researchers from the Georgia Institute of Technology have won a Defense Advanced Research Projects Agency (DARPA) contract to develop three-dimensional chip cooling technology able to handle heat loads as much as ten times greater than systems commonly used today.</p>]]></summary>  <dateline>2013-04-02T00:00:00-04:00</dateline>  <iso_dateline>2013-04-02T00:00:00-04:00</iso_dateline>  <gmt_dateline>2013-04-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>203761</item>      </media>  <hg_media>          <item>          <nid>203761</nid>          <type>image</type>          <title><![CDATA[3D Cooling]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[3d-cooling34.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/3d-cooling34_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/3d-cooling34_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/3d-cooling34_0.jpg?itok=z0YeYHo9]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[3D Cooling]]></image_alt>                    <created>1449179967</created>          <gmt_created>2015-12-03 21:59:27</gmt_created>          <changed>1475894859</changed>          <gmt_changed>2016-10-08 02:47:39</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="63131"><![CDATA[3-D microsystems]]></keyword>          <keyword tid="63151"><![CDATA[chip cooling]]></keyword>          <keyword tid="437"><![CDATA[cooling]]></keyword>          <keyword tid="63141"><![CDATA[heat dissipation]]></keyword>          <keyword tid="63161"><![CDATA[integrated circuits]]></keyword>          <keyword tid="166855"><![CDATA[School of Electrical and Computer Engineering]]></keyword>          <keyword tid="2378"><![CDATA[Woodruff School of Mechanical Engineering]]></keyword>          <keyword tid="31901"><![CDATA[Yogendra Joshi]]></keyword>      </keywords>  <core_research_areas>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="181491">  <title><![CDATA[Spear Phishing: Researchers Work to Counter Email Attacks that Gain Recipients’ Trust]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The email resembled the organization’s own employee e-newsletter and asked recipients to visit a website to confirm that they wanted to continue receiving the newsletter. Another email carried an attachment it said contained the marketing plan the recipient had requested at a recent conference. A third email bearing a colleague’s name suggested a useful website to visit.</p><p>None of these emails were what they pretended to be. The first directed victims to a website that asked for personal information, including the user’s password. The second included a virus launched when the “marketing plan” was opened. The third directed users to a website that attempted to install a malicious program.</p><p>All three are examples of what information security experts at the Georgia Tech Research Institute (GTRI) say is the most challenging threat facing corporate networks today: “spear phishing.”</p><p>Generic emails asking employees to open malicious attachments, provide confidential information or follow links to infected websites have been around for a long time. What’s new today is that the authors of these emails are now targeting their attacks using specific knowledge about employees and the organizations they work for. The inside knowledge used in these spear phishing attacks gains the trust of recipients.</p><p>“Spear phishing is the most popular way to get into a corporate network these days,” said Andrew Howard, a GTRI research scientist who heads up the organization’s malware unit. “Because the malware authors now have some information about the people they are sending these to, they are more likely to get a response. When they know something about you, they can dramatically increase their odds.”</p><p>The success of spear phishing attacks depends on finding the weakest link in a corporate network. That weakest link can be just one person who falls for an authentic-looking email.</p><p>“Organizations can spend millions and millions of dollars to protect their networks, but all it takes is one carefully-crafted email to let someone into it,” Howard said. “It’s very difficult to put technical controls into place to prevent humans from making a mistake. To keep these attacks out, email users have to do the right thing every single time.”</p><p>Howard and other GTRI researchers are now working to help email recipients by taking advantage of the same public information the malware authors use to con their victims. Much of that information comes from social media sites that both companies and malware authors find helpful. Other information may be found in Securities and Exchange Commission (SEC) filings, or even on an organization’s own website.</p><p>“There are lots of open sources of information that will increase the chances of eliciting a response in spear phishing,” Howard said. “We are looking at a way to warn users based on this information. We’d like to see email systems smart enough to let users know that information contained in a suspect message is from an open source and suggest they be cautious.”</p><p>Other techniques to counter the attacks may come from having access to all the traffic entering a corporate network.</p><p>To increase their chance of success, criminals attempting to access a corporate network often target more than one person in an organization. Network security tools could use information about similar spear phishing attempts to warn other members of an organization. And by having access to all email, security systems could learn what’s “normal” for each individual – and recognize unusual email that may be suspicious.</p><p>“We are looking at building behavioral patterns for users so we’d know what kinds of email they usually receive. When something comes in that’s suspicious, we could warn the user,” Howard said. “We think the real answer is to keep malicious email from ever getting into a user’s in-box, but that is a much more difficult problem.”</p><p>It’s difficult because organizations today depend on receiving, opening and responding to email from customers. Deleting or even delaying emails can have a high business cost.</p><p>“What we do requires a careful balance of protecting the user, but allowing the user to get his or her job done,” he said. “Like any security challenge we have to balance that.”</p><p>These and other strategies will be part of Phalanx, a new product being developed by GTRI researchers to protect corporate networks from spear phishing. It will be part of Titan, a dynamic framework for malicious software analysis that GTRI launched last spring.</p><p>Among the challenges ahead are developing natural language algorithms that can quickly separate potential spear phishing attacks from harmless emails. That could be done by searching for language indicating a request such as “open this attachment” or “verify your password.”</p><p>GTRI researchers been gaining experience with corporate networks based on security evaluations they’ve done, and work with GTRI’s own network – which receives millions of emails each day. Fortunately, they say, it’s not just the bad guys who are learning more.</p><p>“The chief financial officers of companies now understand the financial impacts of spear phishing, and whey they join forces with the chief information officers, there will be an urgency to address this problem,” he added. “Until then, users are the front line defense. We need every user to have a little paranoia about email.”<br /><br /><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia&nbsp; 30332-0181</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>)</p><p><strong>Writer</strong>: John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1357651802</created>  <gmt_created>2013-01-08 13:30:02</gmt_created>  <changed>1475896406</changed>  <gmt_changed>2016-10-08 03:13:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are working to counter spear phishing threats to corporate networks.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are working to counter spear phishing threats to corporate networks.]]></sentence>  <summary><![CDATA[<p>Researchers at the Georgia Tech Research Institute (GTRI) are working to counter threats from spear phishing. The attacks use knowledge of computer users to gain their trust to break into corportate networks.</p>]]></summary>  <dateline>2013-01-08T00:00:00-05:00</dateline>  <iso_dateline>2013-01-08T00:00:00-05:00</iso_dateline>  <gmt_dateline>2013-01-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>181471</item>          <item>181481</item>      </media>  <hg_media>          <item>          <nid>181471</nid>          <type>image</type>          <title><![CDATA[Countering Spear Phishing]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[spear-phishing19.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/spear-phishing19_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/spear-phishing19_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/spear-phishing19_0.jpg?itok=kzVwgqxo]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Countering Spear Phishing]]></image_alt>                    <created>1449179053</created>          <gmt_created>2015-12-03 21:44:13</gmt_created>          <changed>1475894828</changed>          <gmt_changed>2016-10-08 02:47:08</gmt_changed>      </item>          <item>          <nid>181481</nid>          <type>image</type>          <title><![CDATA[Countering Spear Phishing2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[spear-phishing135.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/spear-phishing135_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/spear-phishing135_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/spear-phishing135_0.jpg?itok=484JbSuA]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Countering Spear Phishing2]]></image_alt>                    <created>1449179053</created>          <gmt_created>2015-12-03 21:44:13</gmt_created>          <changed>1475894828</changed>          <gmt_changed>2016-10-08 02:47:08</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="415"><![CDATA[Georgia Tech Research Institute]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="169546"><![CDATA[spear phishing]]></keyword>          <keyword tid="4292"><![CDATA[virus]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="147291">  <title><![CDATA[Automated Worm Sorter Detects Subtle Differences in Tiny Animals Used in Genetic Research]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Research into the genetic factors behind certain disease mechanisms, illness progression and response to new drugs is frequently carried out using tiny multi-cellular animals such as nematodes, fruit flies or zebra fish. Often, progress relies on the microscopic visual examination of many individual animals to detect mutants worthy of further study.</p><p>Now, scientists have demonstrated an automated system that uses artificial intelligence and cutting-edge image processing to rapidly examine large numbers of individual <em>Caenorhabditis elegans</em>, a species of nematode widely used in biological research. Beyond replacing existing manual examination steps using microfluidics and automated hardware, the system’s ability to detect subtle differences from worm-to-worm – without human intervention – can identify genetic mutations that might not have been detected otherwise.</p><p>By allowing thousands of worms to be examined autonomously in a fraction of the time required for conventional manual screening, the technique could change the way that high throughput genetic screening is carried out using <em>C. elegans</em>.</p><p>Details of the research were reported August 19th in the advance online publication of the journal <em>Nature Methods</em>. The research has been supported by the National Institutes of Health (NIH), the National Science Foundation (NSF) and the Alfred P. Sloan Foundation.</p><p>“While humans are very good at pattern recognition, computers are much better than humans at detecting subtle differences, such as small changes in the location of dots or slight variations in the brightness of an image,” said <a href="http://www.chbe.gatech.edu/faculty/lu">Hang Lu</a>, the project’s lead researcher and an associate professor in the <a href="http://www.chbe.gatech.edu/">School of Chemical &amp; Biomolecular Engineering</a> at the Georgia Institute of Technology. “This technique found differences that would have been almost impossible to pick out by hand.”</p><p>Lu’s research team is studying genes that affect the formation and development of synapses in the worms, work that could have implications for understanding human brain development. The researchers use a model in which synapses of specific neurons are labeled by a fluorescent protein. Their research involves creating mutations in the genomes of thousands of worms and examining the resulting changes in the synapses. Mutant worms identified in this way are studied further to help understand what genes may have caused the changes in the synapses.</p><p>One aspect the researchers are studying is why synapses form in the wrong locations, or are of the wrong sizes or types. The differences between the mutants and the normal or “wild type” worms indicate inappropriate developmental patterns caused by the genetic mutations.</p><p>Because of the large number of possible genes involved in these developmental processes, the researchers must examine thousands of worms – perhaps as many as 100,000 – to exhaust the search. Lu and her research group had earlier developed a microfluidic “worm sorter” that speeds up the process of examining worms under a microscope, but until now, there were two options for detecting the mutants: a human had to look at each animal, or a simple heuristic algorithm was used to make the sorting decision. Neither option is objective or adaptable to new problems.</p><p>Lu’s system, an optimized version of earlier work by her group, uses a camera to record three-dimensional images of each worm as it passes through the sorter. The system compares each image set against what it has been taught the “wild type” worms should look like. Worms that are even subtly different from normal can be sorted out for further study.</p><p>“We feed the program wild-type images, and it teaches itself to recognize what differentiates the wild type. It uses this information to determine what a mutant type may look like – which is information we didn’t provide to the system – and sorts the worms based on that,” explained Matthew Crane, a graduate student who performed the work. “We don’t have to show the computer every possible mutant, and that is very powerful. And the computer never gets bored.”</p><p>While the system was designed to sort <em>C. elegans</em> for a specific research project, Lu believes the machine learning technology – which is borrowed from computer science – could be applied to other areas of biology that use model genetic organisms. The system’s hardware and software are currently being used in several other laboratories beyond Georgia Tech.&nbsp; &nbsp;</p><p>“Our automated technique can be generalized to anything that relies on detecting a morphometric – or shape, size or brightness difference,” Lu said. “We can apply this to anything that can be detected visually, and we think this could be expanded to studying many other problems related to learning, memory, neuro-degeneration and neural developmental diseases that this worm can be used to model.”</p><p>Individual <em>C. elegans</em> are less than a millimeter long and thinner than a strand of hair, but have 302 neurons with well-defined synapses. While research using single cells can be simpler to do, studies using the worms are good in vivo models for many important processes relevant to human health.</p><p>Other researchers who contributed to this paper include student Jeffrey Stirman from Georgia Tech’s interdisciplinary program in bioengineering, Professor James Rehg from Georgia Tech’s School of Interactive Computing, and three researchers from the Department of Biology at Stanford University’s Howard Hughes Medical Institute: Chan-Yen Ou, Peri Kurshan, and Professor Kang Shen.</p><p>The autonomous processing facilitated by the new system could allow researchers to examine more animals more rapidly, potentially opening up areas of study that are not feasible today.</p><p>“We are hoping that the technology will really change the approach people can take to this kind of research,” said Lu.&nbsp; “We expect that this approach will enable people to do much larger scale experiments that can push the science forward beyond looking what individual mutations are doing in a specific situation.”</p><p><em>The project described was supported by Award Numbers R01GM088333, R21EB012803 and R01AG035317 from the National Institutes of Health. This material is also based on work supported by the National Science Foundation under Grant No. CAREER CBET-0954578. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National lnstitutes of Health or the National Science Foundation.</em></p><p><strong>Citation</strong>: Matthew Crane, Jeffrey Stirman, Chan-Yen Ou, Peri Kurshan, James Rehg, Kang Shen &amp; Hang Lu, <em>Autonomous screening of C. elegans identifies genes implicated in synaptogenesis</em>, DOI: 10.1038/NMETH.2141<br /><br /><strong>Research News &amp; Publications Office</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>75 Fifth Street, N.W., Suite 309</strong><br /><strong>Atlanta, Georgia&nbsp; 30308&nbsp; USA</strong><br /><br /><strong>Media Relations Contact</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1345375900</created>  <gmt_created>2012-08-19 11:31:40</gmt_created>  <changed>1475896360</changed>  <gmt_changed>2016-10-08 03:12:40</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[An automated system allows rapid study of tiny animals used in genetic research.]]></teaser>  <type>news</type>  <sentence><![CDATA[An automated system allows rapid study of tiny animals used in genetic research.]]></sentence>  <summary><![CDATA[<p>Scientists have demonstrated an automated system that uses artificial intelligence and cutting-edge image processing to rapidly examine large numbers of individual nematodes, a tiny animal widely used in biological research.</p>]]></summary>  <dateline>2012-08-19T00:00:00-04:00</dateline>  <iso_dateline>2012-08-19T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-08-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News &amp; Publications Office</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>147271</item>          <item>147261</item>          <item>147281</item>      </media>  <hg_media>          <item>          <nid>147271</nid>          <type>image</type>          <title><![CDATA[Automated Worm Sorter2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[automated-worm-sorter129.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/automated-worm-sorter129_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/automated-worm-sorter129_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/automated-worm-sorter129_0.jpg?itok=0uUJ6svX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Automated Worm Sorter2]]></image_alt>                    <created>1449178763</created>          <gmt_created>2015-12-03 21:39:23</gmt_created>          <changed>1475894782</changed>          <gmt_changed>2016-10-08 02:46:22</gmt_changed>      </item>          <item>          <nid>147261</nid>          <type>image</type>          <title><![CDATA[Automated Worm Sorter]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[automated-worm-sorter45.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/automated-worm-sorter45_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/automated-worm-sorter45_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/automated-worm-sorter45_0.jpg?itok=uWbDqwh3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Automated Worm Sorter]]></image_alt>                    <created>1449178763</created>          <gmt_created>2015-12-03 21:39:23</gmt_created>          <changed>1475894782</changed>          <gmt_changed>2016-10-08 02:46:22</gmt_changed>      </item>          <item>          <nid>147281</nid>          <type>image</type>          <title><![CDATA[Automated Worm Sorter3]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[automated-worm-sorter174.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/automated-worm-sorter174_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/automated-worm-sorter174_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/automated-worm-sorter174_0.jpg?itok=UvJAh2Mj]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Automated Worm Sorter3]]></image_alt>                    <created>1449178763</created>          <gmt_created>2015-12-03 21:39:23</gmt_created>          <changed>1475894782</changed>          <gmt_changed>2016-10-08 02:46:22</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="898"><![CDATA[Hang Lu]]></keyword>          <keyword tid="204"><![CDATA[image processing]]></keyword>          <keyword tid="40871"><![CDATA[image recognition]]></keyword>          <keyword tid="7346"><![CDATA[nematode]]></keyword>          <keyword tid="167750"><![CDATA[School of Chemical &amp; Biomolecular Engineering]]></keyword>          <keyword tid="169516"><![CDATA[synapse]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="142661">  <title><![CDATA[New Data Visualization Tool Helps Find the “Unknown Unknowns”]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A research team at the Georgia Tech Research Institute (GTRI) has developed a software tool that enables users to perform in-depth analysis of modeling and simulation data, then visualize the results on screen. The new data analysis and visualization tool offers improved ease of use compared to similar tools, the researchers say, and could be readily adapted for use with existing data sets in a variety of disciplines.</p><p>The data analysis and visualization tool is a subset of the Test Matrix Tool (TMT), a multi-component system developed by GTRI for designing, executing and analyzing large-scale modeling and simulation data sets. The visualization capability offers a graphical user interface that provides both on-screen data-manipulation features like filters and the ability to see query results in the form of graphical images almost instantly.</p><p>“Data visualization supports data analysis by letting users pose data-related questions onscreen with ease and then view the answers in ways that go far beyond ordinary table formats,” said Edward Clarkson, a GTRI research scientist who is leading the data visualization work. “A picture can be worth a thousand numbers, because visualizing data in a graph allows us to see patterns that might not be apparent from purely numerical results.”</p><p>Development of the Test Matrix Tool and its components is being led by Greg Rohling, a GTRI principal research engineer. Rohling’s team developed the TMT to support modeling and simulation investigations into the effectiveness and optimization of numerous U.S. defense systems, including electronic warfare equipment used to protect military aircraft. The work is supported by the Warner Robins Air Logistics Center at Robins Air Force Base.</p><p>In developing a simulation test, Test Matrix Tool users can specify desired variations in input parameters using multiple data filters. The TMT system executes all possible combinations of those parameters, creating a test matrix. It then executes the simulations on a Sun/Oracle Grid Engine and stores the resulting simulation output data in a MySQL database.&nbsp;</p><p>At that point, TMT’s data analysis component, which includes the data visualization tool, helps users evaluate the often complex test results. By collating the test matrix input and output, the data analysis tools allow users to efficiently filter and visualize test matrix data.</p><p>The Test Matrix Tool is designed for use on personal computers.&nbsp; It works under the Linux and Microsoft Windows operating systems.</p><p><strong>Numerous Potential Applications</strong></p><p>Some TMT capabilities, including the data analysis and visualization components, could be useful for scrutinizing information gathered in many disciplines, Clarkson said.&nbsp; He mentioned health care as one field where a multitude of existing data sets could be mined for new insights.</p><p>“For example, there’s an enormous amount of data out there on heart patients,” he said. “Our data tools could be used to investigate existing patient information and seek significant trends in the data.”</p><p>Clarkson explained that users would face the challenge of organizing legacy data sets into formats that the GTRI data analysis software can exploit. But that task, he added, is generally straightforward and can be performed with automated tools in many cases.</p><p>The data format required by the TMT tools, he explained, is not particularly complex. What’s needed is a standard database setup in which the information fields are organized into tabular formats. Moreover, any required metadata – special data that tell the system how to deal with a particular data set – would likely present few development issues.</p><p>Clarkson recently demonstrated the capabilities of the data analysis and visualization tool using an existing database: baseball statistics. This particular demonstration involved the use of 40 different data filters available onscreen; the TMT system allows for 300 or more such filters.</p><p>In a random query of the 46,000 National League players from the past, an onscreen graph unexpectedly revealed an interesting anomaly during the demonstration. The data indicate that players’ height and weight increased in every past decade except the 1920s and 1930s, when it stayed inexplicably flat.</p><p>“That’s the beauty of this kind of tool – it can find the unknown unknowns,” Clarkson observed. “Details show up in graphs that aren’t obvious when you’re looking at just the numbers.”</p><p>The TMT data visualization tool, he explained, bears some similarities to the data filtering features found on some websites. For example, many shopping sites let users search for products by using filters to select desired qualities such as size, color and brand name.</p><p>However, Clarkson said, TMT’s capabilities are considerably more advanced. Whereas commercial systems stop at the filtering stage, the TMT data analysis tools allow fundamental manipulation of the data. Using filters, investigators can transform the data mathematically, a process that makes unique insights and discoveries possible.</p><p>“Data analysis and visualization are great for finding many things you want to know,” Clarkson said.&nbsp; “But another real advantage is that they can detect what you perhaps don’t want to know – the bugs and the anomalies -- the things that just aren’t right and have to be fixed."<br /><br /></p><p><strong>Research News &amp; Publications Office</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>75 Fifth Street, N.W., Suite 309</strong><br /><strong>Atlanta, Georgia&nbsp; 30308&nbsp; USA</strong><br /><br /><strong>Media Relations Contacts</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Kirk Englehardt (404-894-6015)(<a href="mailto:kirk.englehardt@comm.gatech.edu">kirk.englehardt@comm.gatech.edu</a>).</p><p><strong>Writer</strong>: Rick Robinson<br /><br /></p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1343231652</created>  <gmt_created>2012-07-25 15:54:12</gmt_created>  <changed>1475896356</changed>  <gmt_changed>2016-10-08 03:12:36</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new software tool allows users to perform in-depth analysis of modeling and simulation data, then visualize the results on screen.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new software tool allows users to perform in-depth analysis of modeling and simulation data, then visualize the results on screen.]]></sentence>  <summary><![CDATA[<p>A research team at the Georgia Tech Research Institute (GTRI) has developed a software tool that enables users to perform in-depth analysis of modeling and simulation data, then visualize the results on screen. The new data analysis and visualization tool offers improved ease of use compared to similar tools, the researchers say, and could be readily adapted for use with existing data sets in a variety of disciplines.</p>]]></summary>  <dateline>2012-07-25T00:00:00-04:00</dateline>  <iso_dateline>2012-07-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-07-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News &amp; Publications Office</p><p>(404) 894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>142641</item>          <item>142651</item>      </media>  <hg_media>          <item>          <nid>142641</nid>          <type>image</type>          <title><![CDATA[Data Visualization]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[110606r021_s.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/110606r021_s_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/110606r021_s_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/110606r021_s_0.jpg?itok=ITcQKMqK]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Data Visualization]]></image_alt>                    <created>1449178723</created>          <gmt_created>2015-12-03 21:38:43</gmt_created>          <changed>1475894774</changed>          <gmt_changed>2016-10-08 02:46:14</gmt_changed>      </item>          <item>          <nid>142651</nid>          <type>image</type>          <title><![CDATA[Data Visualization2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[110606r111_s.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/110606r111_s_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/110606r111_s_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/110606r111_s_0.jpg?itok=FgzbQVj5]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Data Visualization2]]></image_alt>                    <created>1449178723</created>          <gmt_created>2015-12-03 21:38:43</gmt_created>          <changed>1475894774</changed>          <gmt_changed>2016-10-08 02:46:14</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="438"><![CDATA[data]]></keyword>          <keyword tid="38921"><![CDATA[data visualization]]></keyword>          <keyword tid="38931"><![CDATA[Ed Clarkson]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="38941"><![CDATA[Test Matrix Tool]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="142851">  <title><![CDATA[Program Provides Ex-Offenders with Marketable Skills; Expands Production of Braille Materials]]></title>  <uid>27303</uid>  <body><![CDATA[<p>An enhanced training program designed to teach Braille transcription, computer skills and business techniques to soon-to-be-released offenders could expand the quantity of printed materials available for blind and visually impaired persons – while providing ex-offenders marketable skills designed to reduce recidivism rates.</p><p>Known as Providing Real Opportunities for Income through Technology (PROFITT), the program is being evaluated at a maximum-security correctional facility in Texas. Once completed and approved, the PROFITT curriculum will be made available to other correctional facilities interested in starting or enhancing Braille training programs.&nbsp; The project was funded by the Second Chance Act, administered by the U.S. Department of Justice’s Bureau of Justice Assistance.</p><p>An expansion of earlier Braille training programs, PROFITT has been developed through a partnership of the National Braille Press, the Texas Department of Criminal Justice and the Alternative Media Access Center (AMAC) at the Georgia Institute of Technology. Beyond Braille skills, PROFITT teaches broader professional skills, including computer operation and computer graphics, small business management and “soft skills” designed to help ex-offenders work as independent consultants.</p><p>“PROFITT provides a blueprint for use by any correctional facility interested in implementing a comprehensive, competency-based Braille training program geared toward preparing offenders for long-term sustainable income upon release,” said Patrick Fraser, the program’s coordinator. “The goal is not only to reduce the rate of recidivism, but also to help meet the need for Braille materials.”</p><p>The PROFITT pilot program at the Mountain View Braille Facility in Gatesville, Tex., will conclude in mid-July. Input from the pilot will be incorporated into the curriculum, which must still be approved by the U.S. Department of Justice.</p><p>Braille is a good topic for prison training programs because it requires extensive instruction and practice, noted Tamara Rorie, a technology licensing associate at AMAC. The PROFITT program includes 750 hours of hands-on classroom training over a period of about 30 weeks.</p><p>“It’s a matter of not only learning the material, but also gaining experience,” she said. “It takes about a year for people to become certified in literary Braille, which is the base level. Once they get that, they can continue working on advanced certifications.”</p><p>Because the code is difficult to learn, there is an unmet need for people trained to produce Braille materials.</p><p>“There are still not enough Braille transcribers to provide the materials that students need, especially textbooks,” Rorie said. “For every hundred books that are published, only one is converted to Braille.”</p><p>The Braille code uses a system of raised dots to represent characters, words and portions of words that can be read by blind and visually impaired persons. Braille has been compared to stenographer’s shorthand, and includes several levels of higher certification for mathematics, tactile graphics, textbook formatting and even music.</p><p>“Braille is literacy for people who are visually impaired,” said Fraser. “People can listen to a book through a recording or screen reader, but they are not really grasping the full notions of spelling and grammar that are the basis for language and communication. Tactile graphics produced in Braille allow a fuller understanding of the material, and this is especially important to students.”</p><p>Braille transcription is often done by independent contractors who receive and deliver their work via the Internet. That freedom is helpful to ex-offenders, whose employment opportunities may otherwise be limited by their criminal records.</p><p>“A lot of people in the prison Braille programs have never worked a real job,” said Rorie. “Those who would like to become independent contractors must understand the kind of discipline required to work by themselves.”</p><p>There are about three dozen prison Braille training programs operating in the United States. In addition to preparing offenders for an occupation upon release, the programs provide Braille textbooks and other materials mandated by federal law for K-12 schools and other organizations. The services also can provide trainees a sense of purpose.</p><p>“The Braille program has given them a reason for being, and it gives them a reason to get up every morning because they love doing what they are doing and they love seeing the finished product,” said Delores Billman, industry supervisor at the Mountain View Prison. “They certainly like to know that someone is using what they have done to better themselves.”</p><p>PROFITT’s pilot program at the Mountain View facility is teaching about 15 women who had no previous experience with Braille. But the five-track curriculum is designed so that people with Braille skills can separately use the computer and graphics training, as well as the small business and “soft skills” portions. At Mountain View, another 23 women are studying these components in preparation for release.</p><p>Sabrina Hodges, a Braille transcriber at the Mountain View prison, sees the program as key to her future.</p><p>“I know that I am going to get something out of this, not just for parole, but when I go home,” she said. “I have made a lot of promises to my family and to myself when I got here, and this program has helped me make that happen.”</p><p>To be eligible for PROFITT, offenders must be free of behavioral infractions for a year, have a good command of the English language and be at least six months away from release. While the Mountain View facility is a women’s prison, Braille training programs operate at both men’s prisons and juvenile facilities, Rorie noted.</p><p>PROFITT provides a win-win for both offenders and the larger society, Fraser said.</p><p>“Braille is not inexpensive to produce, and programs like this can help provide textbook materials to meet the needs of blind and visually impaired students,” he explained.&nbsp; “In addition to meeting the demand for these materials, these programs are providing ex-offenders with skills that will allow them to be tax-paying citizens when they get out.”</p><p><em><strong>This project was supported by Grant No. 2010-RV-BX-0005 awarded by the Bureau of Justice Assistance. The Bureau of Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, the SMART Office, and the Office for Victims of Crime. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the United States Department of Justice.</strong></em><br /><br /><strong>Research News &amp; Publications Office</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>75 Fifth Street, N.W., Suite 309</strong><br /><strong>Atlanta, Georgia&nbsp; 30308&nbsp; USA</strong><br /><br /><strong>Media Relations Assistance</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>).<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1343319166</created>  <gmt_created>2012-07-26 16:12:46</gmt_created>  <changed>1475896356</changed>  <gmt_changed>2016-10-08 03:12:36</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new Braille curriculum is giving skills to ex-offenders and producing materials for the blind.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new Braille curriculum is giving skills to ex-offenders and producing materials for the blind.]]></sentence>  <summary><![CDATA[<p>An enhanced training program designed to teach Braille transcription, computer skills and business techniques to soon-to-be-released offenders could expand the quantity of printed materials available for blind and visually impaired persons – while providing ex-offenders marketable skills designed to reduce recidivism rates.</p>]]></summary>  <dateline>2012-07-26T00:00:00-04:00</dateline>  <iso_dateline>2012-07-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-07-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News &amp; Publications Office</p><p>(404) 894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>142791</item>          <item>142801</item>          <item>142821</item>          <item>142811</item>      </media>  <hg_media>          <item>          <nid>142791</nid>          <type>image</type>          <title><![CDATA[Creating a Bar Graph]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[profitt0191.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/profitt0191_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/profitt0191_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/profitt0191_0.jpg?itok=1L2OFF2z]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Creating a Bar Graph]]></image_alt>                    <created>1449178723</created>          <gmt_created>2015-12-03 21:38:43</gmt_created>          <changed>1475894774</changed>          <gmt_changed>2016-10-08 02:46:14</gmt_changed>      </item>          <item>          <nid>142801</nid>          <type>image</type>          <title><![CDATA[Creating Tactile Graphic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[profitt257.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/profitt257_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/profitt257_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/profitt257_0.jpg?itok=7CCtx1x2]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Creating Tactile Graphic]]></image_alt>                    <created>1449178723</created>          <gmt_created>2015-12-03 21:38:43</gmt_created>          <changed>1475894774</changed>          <gmt_changed>2016-10-08 02:46:14</gmt_changed>      </item>          <item>          <nid>142821</nid>          <type>image</type>          <title><![CDATA[Tactile Graphic]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[profitt477.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/profitt477_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/profitt477_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/profitt477_0.jpg?itok=08nBDU_L]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tactile Graphic]]></image_alt>                    <created>1449178723</created>          <gmt_created>2015-12-03 21:38:43</gmt_created>          <changed>1475894774</changed>          <gmt_changed>2016-10-08 02:46:14</gmt_changed>      </item>          <item>          <nid>142811</nid>          <type>image</type>          <title><![CDATA[Braille Transcription]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[profitt0501.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/profitt0501_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/profitt0501_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/profitt0501_0.jpg?itok=2amxXNAU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Braille Transcription]]></image_alt>                    <created>1449178723</created>          <gmt_created>2015-12-03 21:38:43</gmt_created>          <changed>1475894774</changed>          <gmt_changed>2016-10-08 02:46:14</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>      </news_terms>  <keywords>          <keyword tid="39021"><![CDATA[Alternative Media Access Center]]></keyword>          <keyword tid="38981"><![CDATA[Braille]]></keyword>          <keyword tid="39061"><![CDATA[Braille training]]></keyword>          <keyword tid="39071"><![CDATA[corrections]]></keyword>          <keyword tid="3671"><![CDATA[Enterprise Innovation Institute]]></keyword>          <keyword tid="39081"><![CDATA[prison]]></keyword>          <keyword tid="39001"><![CDATA[recidivism]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="144081">  <title><![CDATA[Animation Research Could Offer Unparalleled Control of Characters Without Skeletons]]></title>  <uid>27560</uid>  <body><![CDATA[<p class="p1">Computer-generated characters have become so lifelike in appearance and movement that the line separating reality is almost imperceptible at times. “The Matrix” sequels messed with audiences’ perceptions of the real world (in more ways than one) with action scenes mixing CG characters and real actors. Almost a decade later, superheroes and blue aliens dominate the multiplex. But while bipeds and quadrupeds have reigned supreme in CG animation, attempts to create and control their skeleton-free cousins using similar techniques has proved time-consuming and laborious.</p><p class="p2">Georgia Tech researchers have found a possible solution to this challenge by developing a way to simulate and control movement of computer-generated characters without a skeletal structure, anything from starfish and earthworms to an elephant’s trunk or the human tongue.</p><p class="p2">Their modeling techniques have the potential to allow amateur animators and even young children unparalleled control of digital creatures by simply pointing and clicking on a screen to have them move the way they want. One can imagine aspiring animators with tools in the near future to build a more boisterous Bob - “Monsters vs. Aliens’” resident blob - or an updated Ursula from “The Little Mermaid,” with her sinister tentacles used to full effect with computer graphics.</p><p class="p2">The researchers’ work targets simulation and control of soft body locomotion - movement of characters without a skeletal structure – something that is rarely explored in animation, according to Karen Liu, one of the researchers and associate professor in the School of Interactive Computing at Georgia Tech.</p><p class="p2">Eschewing the traditional use of skeletons with moving joints as the basis for animation control, the Georgia Tech research simulates soft body computer models and controls their movement in completely new ways. Liu and fellow researchers Jie Tan and Greg Turk will present their research paper “Soft Body Locomotion” at SIGGRAPH 2012, the ACM international conference on computer graphics and interactive techniques, in Los Angeles, Aug. 5-9.</p><p class="p2">The computer models used in the research - <a title="Jello-like alphabet letters" href="http://www.cc.gatech.edu/%7Ejtan34/project/softBodyLocomotion.html" target="_blank">jello-like alphabet letters</a> - mimicked nature’s soft body organisms and were created using “muscle fibers to control a volume-preserving finite element mesh.” In short, just as a hacky sack or bean bag maintain their mass no matter how they are squashed, the computer models followed the same principle.</p><p class="p2">The soft body ABCs were able to perform a wide array of motions that users decided with simple point-and-click commands. The researchers developed algorithms that allowed “high-level goals,” which refer to specific movements, like walking from one point to another, or jumping and then regaining balance. Prior to this technique, in order to get soft body characters to perform some meaningful movement, animators might attempt thousands of computer simulation trials to get the soft body even close to a functional motion, Liu says.</p><p class="p2">“In this project we ‘physically simulated’ or created lifelike movements in the soft body models that don’t require much user intervention. We’ve built a framework where the user or the animator can just click on a point of the soft body and direct the type of movement he or she wants.”</p><p class="p2">Jie Tan, a Ph.D. candidate in Computer Science, took on primary animation duties and implemented muscle types to produce different motions in the models. Users need only to pick the muscles for their creatures, the movement they want, and watch as the algorithm determines the muscle force needed to fulfill the action.&nbsp;</p><p class="p2">Greg Turk, professor in the School of Interactive Computing, says the techniques could be an important part of an animator’s toolbox to create graphics-based characters that need to be more flexible or bendable.</p><p class="p2">Central to the research was solving how soft body characters would employ a balancing strategy during movement. Characters with skeletal support can use their relatively unchanging contact points with the ground to maintain balance (feet size doesn’t change), but soft body characters without legs might have to lengthen their bodies and slide (expanding surface contact) or jump (breaking surface contact). The researchers actively exploited these different types of contact strategies to achieve control goals, including balance.</p><p class="p3">“We believe this research contribution is one that can apply broadly to other problems in animation control,” Liu says.</p><p class="p2">A video of the researchers’ soft body models in action can be found at <a title="Soft Body Locomotion" href="http://www.cc.gatech.edu/%7Ejtan34/project/softBodyLocomotion.html" target="_blank">http://www.cc.gatech.edu/~jtan34/project/softBodyLocomotion.html</a></p><p class="p3">Greg Turk will be honored this year at SIGGRAPH with the Computer Graphics Achievement Award and Karen Liu will receive the Significant New Researcher Award. This research was funded by NSF CCF-811485, IIS-11130934 and the Alfred P. Sloan Foundation.</p>]]></body>  <author>Jason Maderer</author>  <status>1</status>  <created>1343921481</created>  <gmt_created>2012-08-02 15:31:21</gmt_created>  <changed>1475896356</changed>  <gmt_changed>2016-10-08 03:12:36</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>news</type>  <sentence><![CDATA[]]></sentence>  <summary><![CDATA[<p class="p1">Computer-generated characters have become so lifelike in appearance and movement that the line separating reality is almost imperceptible at times. But while bipeds and quadrupeds have reigned supreme in CG animation, attempts to create and control their skeleton-free cousins using similar techniques has proved time-consuming and laborious.</p><p class="p2">Georgia Tech researchers have found a possible solution to this challenge by developing a way to simulate and control movement of computer-generated characters without a skeletal structure, anything from starfish and earthworms to an elephant’s trunk or the human tongue.</p>]]></summary>  <dateline>2012-08-02T00:00:00-04:00</dateline>  <iso_dateline>2012-08-02T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-08-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jpreston@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Joshua Preston<br /><a href="mailto:jpreston@cc.gatech.edu">jpreston@cc.gatech.edu</a><br />678.231.0787</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>143831</item>      </media>  <hg_media>          <item>          <nid>143831</nid>          <type>image</type>          <title><![CDATA[Soft Body Locomotion]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[soft_body_locomotion.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/soft_body_locomotion_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/soft_body_locomotion_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/soft_body_locomotion_0.jpg?itok=0aTvp3Qs]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Soft Body Locomotion]]></image_alt>                    <created>1449178739</created>          <gmt_created>2015-12-03 21:38:59</gmt_created>          <changed>1475894777</changed>          <gmt_changed>2016-10-08 02:46:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="4534"><![CDATA[animation]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="137741">  <title><![CDATA[Georgia Tech and Veterans Health Administration Collaborate on Health IT]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Two major non-commercial health information technology organizations are working together in a new vendor-neutral health IT innovation network designed to stimulate development of new ideas and shorten the time required to bring new solutions into practice.</p><p>The Department of Veterans Affairs (VA) Veterans Health Administration’s (VHA) Innovation Sandbox Cloud and the Georgia Institute of Technology’s Interoperability and Integration Innovation Lab will collaborate to address interoperability issues, accelerate the development of integrated health IT solutions, provide an unbiased environment for testing new products and help train the IT workforce needed to move the industry forward. Georgia Tech is believed to be the first academic organization to connect directly to VHA’s system.</p><p>The two organizations have signed a memorandum of understanding that will formally connect innovation facilities and allow researchers from both organizations to collaborate on specific projects. The agreement also facilitates the use of the Veterans Health Information Systems and Technology Architecture (VistA), VHA’s electronic health records system, to test new products and solutions. VistA is already used to help manage care for 7.6 million active U.S. veterans across VHA’s nationwide health care system and is widely considered to be the best electronic health records system in operation.</p><p>“We believe that together we can do something really unique and important,” said Steve Rushing, director of Health@EI2, a health care innovation initiative at Georgia Tech. “By connecting our interoperability innovation lab to the VHA’s Sandbox Cloud, we can create joint project teams to work on specific challenges, work together to address industry issues and develop best practices, and test applications designed to run with the VA’s robust electronic health records system.”</p><p>VHA and Georgia Tech share many of the same goals and, by working together, the organizations can leverage investments made by VA and other federal agencies, noted Robert Kolodner, M.D., who led development of VistA during his 28-year career at the VA. Kolodner serves as a strategic advisor to Georgia Tech on its health care IT initiatives.</p><p>“This collaboration enables decades of health IT advances by VA to be combined with investments by other federal agencies and with resources from both the state and private sectors,” Kolodner said. “Together, they create a robust, diverse education and simulation environment. We can train the health IT workforce necessary to succeed as our national health IT initiatives improve the health and well-being of individuals and communities across the nation.”</p><p>Georgia Tech’s Interoperability and Integration Innovation Lab (I3L) was established to stimulate new ideas in health IT by creating a standards-based environment in which resources can be shared, barriers reduced, and new products more rapidly developed and introduced. Beyond addressing existing challenges for the industry, the lab will help participants – including academic and nonprofit organizations, as well as providers of both commercial and open source products – anticipate the trends and opportunities that will drive health IT in the future.</p><p>“The I3L will help us understand how to create conformance in interoperable systems and how in the future all of the health and medical devices and systems can be tied together to create a seamless view of what’s happening to the patient,” said Jeff Evans, deputy director of the Information and Communications Laboratory in the Georgia Tech Research Institute (GTRI). “It will take us into the future of what health care is going to be, while also supporting the requirements of today.”</p><p>VHA’s Innovation Sandbox Cloud has a mission comparable to that of Georgia Tech’s I3L.</p><p>“VHA’s Innovation Sandbox Cloud serves as a virtual space to facilitate health IT innovation through collaboration and the development of new ideas, requirements and products that can become solutions within VistA,” said Craig Luigart, chief officer, VHA Office of Health Information. “Our health data systems interconnection with Georgia Tech’s I3L Sandbox is a landmark in the government’s Health Information Technology Innovation and Development Environments (HITIDE) initiative.”&nbsp; The HITIDE initiative supports the development of interoperable health IT systems by leveraging existing federal agency health IT test bed environments for a cross-agency, virtual, active, innovation ecosystem.</p><p>Beyond connecting electronic health records systems and helping them share information, I3L will also link to Gwinnett Technical College’s health IT certificate program to help expand the workforce needed to build and maintain health IT systems. The initiative, funded by the U.S. Employment and Training Administration, connects students – including Veterans – to state-of-the-market training resources.&nbsp;</p><p>“Industry is telling us that it needs a health IT work force with a different set of skills than what is now available in the marketplace,” said Marla Gorges, associate director of Georgia Tech’s Health@EI2 program. “Through the Gwinnett Technical College program, I3L will give students access to a wide range of commercial and open source systems.”</p><p>Already, Gorges said, the resources of I3L have been used in Georgia Tech courses, helping students learn the real-world issues of health IT and propose solutions for them.</p><p>The overall goal for these initiatives is to improve patient care and community health through better exchange of information, Rushing noted.</p><p>“Other industries have transitioned to electronic systems, but none of them has faced the complexity of the health care industry,” Rushing said. “As the largest organization paying for health care services, the federal government has been pushing for an integrated health care information system that would allow patient records to be shared by all those caring for a specific patient.”</p><p>Georgia Tech’s expertise and experience with interoperability issues in other areas – such as connecting criminal justice information networks in collaboration with the U.S. Department of Justice – provides a foundation for what it expects to do in health care IT. Its connections to designers of medical devices, information security specialists and developers of wireless communications systems at Georgia Tech and elsewhere will also help anticipate the future of health care information systems.</p><p>“We are standing up a health care test bed that builds on all our work in the past with how to tie networks together and ensure that they’re set up in such a way that regardless of the network and the information exchange elements, we can still share elements and databases,” Evans said. “We are setting up not only an interoperability lab, but also an environment where we can see how this will work in the future.”</p><p><strong>About the I3L</strong>:&nbsp; The I3L is a standards-based facility located at the Georgia Tech Research Institute. The lab will test and evaluate cutting-edge health IT (HIT) software innovations originating from industry, researchers, faculty and students, inventors and other sources.&nbsp; The I3L is funded in part by the federal government’s Jobs and Innovation Accelerator Challenge, a tri-agency competition initiated to support the advancement of 20 high-growth, regional industry clusters. The overarching goal is to achieve higher-quality, lower-cost and more patient-centric health care throughout the state of Georgia.</p><p><strong>About Enterprise Innovation Institute</strong>: The Georgia Tech Enterprise Innovation Institute helps companies, entrepreneurs, economic developers and communities improve their competitiveness through the application of science, technology and innovation. It is one of the most comprehensive university-based programs of business and industry assistance, technology commercialization and economic development in the nation.</p><p><strong>Research News &amp; Publications Office</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>75 Fifth Street, N.W., Suite 314</strong><br /><strong>Atlanta, Georgia&nbsp; 30308&nbsp; USA</strong><br /><br /><strong>Media Relations Contacts</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Abby Robinson (404-385-3364)(<a href="mailto:abby@innovate.gatech.edu">abby@innovate.gatech.edu</a>).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1340659365</created>  <gmt_created>2012-06-25 21:22:45</gmt_created>  <changed>1475896346</changed>  <gmt_changed>2016-10-08 03:12:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Two non-commercial health information technology organizations are working together to bring new solutions into practice.]]></teaser>  <type>news</type>  <sentence><![CDATA[Two non-commercial health information technology organizations are working together to bring new solutions into practice.]]></sentence>  <summary><![CDATA[<p>Two major non-commercial health information technology organizations are working together in a new vendor-neutral health IT innovation network designed to stimulate development of new ideas and shorten the time required to bring new solutions into practice.</p>]]></summary>  <dateline>2012-06-25T00:00:00-04:00</dateline>  <iso_dateline>2012-06-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-06-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Organizations will address interoperability and related issues]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News &amp; Publications Office</p><p>(404) 894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>137731</item>      </media>  <hg_media>          <item>          <nid>137731</nid>          <type>image</type>          <title><![CDATA[Interoperability and Integration Innovation Lab]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[va-i3l179.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/va-i3l179_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/va-i3l179_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/va-i3l179_0.jpg?itok=YxQDtbwV]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Interoperability and Integration Innovation Lab]]></image_alt>                    <created>1449178698</created>          <gmt_created>2015-12-03 21:38:18</gmt_created>          <changed>1475894769</changed>          <gmt_changed>2016-10-08 02:46:09</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="15312"><![CDATA[health it]]></keyword>          <keyword tid="37231"><![CDATA[interoperability]]></keyword>          <keyword tid="1687"><![CDATA[Veterans Administration]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="131291">  <title><![CDATA[Bird Vocalization Research Could Improve Poultry Production, Lower Costs]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Chickens can’t speak, but they can definitely make themselves heard. Most people who have visited a poultry farm will recall chicken vocalization – the technical term for clucking and squawking – as a memorable part of the experience.</p><p>Researchers now believe that such avian expressiveness may be more than idle chatter. A collaborative project being conducted by the Georgia Institute of Technology and the University of Georgia is investigating whether the birds’ volubility can provide clues to how healthy and comfortable they are.&nbsp;</p><p>And that could be valuable information. Economically, chickens rule the roost in Georgia, where poultry is the top agricultural product with an estimated annual impact of nearly $20 billion statewide. There is industry concern about the welfare of the animals they raise; anything that helps growers reap a maximum return on every flock – while maintaining an environment conducive to their well-being – can translate to important dividends for the state’s economy.</p><p>“Many poultry professionals swear they can walk into a grow-out house and tell whether a flock is happy or stressed just by listening to the birds vocalize,” said Wayne Daley, a Georgia Tech Research Institute (GTRI) principal research scientist who is leading the research. “The trouble is, it has proved hard for these pros to pinpoint for us exactly what it is that they're hearing.”</p><p>Nevertheless, scientists are convinced that poultry farmers are detecting something real. Recent research at the University of Connecticut’s Department of Animal Science indicates that it is indeed possible to differentiate how the birds react to various conditions based on their vocalizations.</p><p>“The behavior of chickens is one of the best and most immediate indicators of their well-being,” said Bruce Webster, a University of Georgia poultry science professor who is working on the project. “Chickens are vocal creatures and produce different types of vocalizations at different rates and loudness depending on their circumstances.”&nbsp;&nbsp; &nbsp;</p><p>So the Georgia Tech/University of Georgia team is working to identify and extract specific vocalization features that will bear out both the anecdotal observations and the previous scientific work. The researchers are performing stress-related experiments on small flocks, recording the birds’ reactions on audio and video and analyzing the results. &nbsp;</p><p>GTRI is providing expertise in control-systems development and image processing, while Georgia Tech’s School of Electrical and Computer Engineering is contributing audio signal-processing technology and the University of Georgia is providing research facilities as well as guidance in experimental design as they relate to animal behavior and welfare issues.</p><p>“If what experienced farmers hear and sense can be defined and quantified, sensors to detect cues from the birds themselves could really make a difference in providing real-time information on house environment, bird health, and comfort,” said Michael Lacy, head of the Department of Poultry Science at the University of Georgia.</p><p>The work is funded by the Agricultural Technology Research Program, a state-supported effort to benefit the poultry and food-processing industries.</p><p>Naturally, said Daley, the poultry industry already has well-established guidelines covering optimal temperature, air quality and stocking density.&nbsp; Nevertheless, costly problems can still crop up – control systems can malfunction, or presumably ideal levels can turn out to be problematic. &nbsp;</p><p>“That’s where being able to judge the flock’s behavior can be so important,” Daley said. “Your temperature sensors might say that things are fine, but the birds could be telling you that they think it's a bit too warm or other changes have occurred to make the conditions less than ideal.”</p><p>From a poultry professional’s viewpoint, the flock’s opinion is probably the definitive one. Chickens take only six weeks to go from hatching to finished weight; stressful conditions can retard their growth, reducing their value when they go to market.</p><p>“Contract poultry producers are paid by the pound of birds sent to market. Improving the overall health and productivity of the birds will help to improve the bottom line for individual producers,” said Casey Ritz, a University of Georgia associate professor of poultry science who is involved in the research.</p><p>The research team has conducted several experiments in which they have exposed flocks to mildly stressful environmental changes.&nbsp; For example, temperature or ammonia levels might be increased from their initial settings for a few hours, then returned to the original level.</p><p>The researchers have recorded the flocks’ vocal reactions to the experiments, with video also collected in many instances.&nbsp; To date, more than four terabytes of bird-vocalization audio has been gathered.</p><p>Almost at once, the researchers encountered a knotty problem as they recorded bird sounds. They discovered that the large fans necessary for air circulation in a grow-out house can be considerably louder than the chickens, making it difficult to capture bird vocalizations effectively.</p><p>David Anderson, a professor in the Georgia Tech School of Electrical and Computer Engineering, has been working on the best methods for harvesting useable bird sounds from the noisy environment.&nbsp; It’s a classic audio signal-processing problem, he said, in which the signal of interest must separated from the noise that surrounds it.</p><p>“We have several approaches for extracting poultry voicing from the others noises, and we've been pretty successful in achieving that,” he said.&nbsp; “What makes this different from most other bird-song research is that we're not listening to individuals, we’re listening to sounds in the aggregate. It’s like trying to understand what people are saying in a restaurant, when all you hear are the murmurings of a hundred diners.”</p><p>To decode mass poultry vocalizing, Anderson is extracting particular features of the sound, such as speed, volume, pitch and other qualities. Then he’s utilizing machine learning – in which computers recognize complex patterns in data and make decisions based on those patterns – to analyze the extracted features and determine which characteristics may convey specific meanings.</p><p>“These are initial experiments, and we're going to have to test under a variety of conditions, but we’ve had considerable success already,” Anderson said.&nbsp; “By listening to the flock we can accurately tell when the birds are experiencing particular kinds of stress, such as significant temperature changes.”</p><p>In addition to ensuring high yield flocks, bird-vocalization analysis could save poultry growers money in equipment costs as well, Anderson suggested.&nbsp; For instance, he said, currently available ammonia sensors are both expensive and short-lived.&nbsp; If a system consisting of a few microphones and the right computer algorithms could take over ammonia-detection tasks, it would help reduce costs for the entire industry.</p><p>To date, video of the flocks hasn’t produced results as useful as the sound recordings, said GTRI’s Daley. But image processing of flock-reaction video continues, and could yield significant data down the road.</p><p>“This multi-disciplinary, multi-institution project highlights the different skills necessary to tackle current problems,” Daley said.&nbsp; “This approach will be valuable in years to come as we tackle a variety of problems to help the industry continue to be profitable and sustainable.”<br /><br /><strong>Research News &amp; Publications Office</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>75 Fifth Street, N.W., Suite 314</strong><br /><strong>Atlanta, Georgia&nbsp; 30308&nbsp; USA</strong><br /><br /><strong>Media Relations Assistance</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>); Abby Robinson (404-385-3364)(<a href="mailto:abby@innovate.gatech.edu">abby@innovate.gatech.edu</a>) or Kirk Englehardt (404-894-6015)(<a href="mailto:kirk.englehardt@comm.gatech.edu">kirk.englehardt@comm.gatech.edu</a>)<br /><br /><strong>Writer</strong>: Rick Robinson</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1337204733</created>  <gmt_created>2012-05-16 21:45:33</gmt_created>  <changed>1475896338</changed>  <gmt_changed>2016-10-08 03:12:18</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Listening to chickens could help engineers and poultry scientists better control growing conditions.]]></teaser>  <type>news</type>  <sentence><![CDATA[Listening to chickens could help engineers and poultry scientists better control growing conditions.]]></sentence>  <summary><![CDATA[<p>Listening to squawks and other chicken "vocalizations" using digital signal processing techniques may help farmers better manage growing conditions, contributing to both healthier birds and more productive poultry operations.</p>]]></summary>  <dateline>2012-05-16T00:00:00-04:00</dateline>  <iso_dateline>2012-05-16T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-05-16 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Collaboration with poultry scientists could boost Georgia industry]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News &amp; Publications Office</p><p>404-894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>131251</item>          <item>131261</item>          <item>131271</item>      </media>  <hg_media>          <item>          <nid>131251</nid>          <type>image</type>          <title><![CDATA[Chicken Vocalization]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bird-vocalization29.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bird-vocalization29_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bird-vocalization29_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bird-vocalization29_0.jpg?itok=bJ8VPOSP]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chicken Vocalization]]></image_alt>                    <created>1449178647</created>          <gmt_created>2015-12-03 21:37:27</gmt_created>          <changed>1475894691</changed>          <gmt_changed>2016-10-08 02:44:51</gmt_changed>      </item>          <item>          <nid>131261</nid>          <type>image</type>          <title><![CDATA[Chicken Vocalization2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bird-vocalization91.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bird-vocalization91_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bird-vocalization91_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bird-vocalization91_0.jpg?itok=jRbJo7ES]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chicken Vocalization2]]></image_alt>                    <created>1449178647</created>          <gmt_created>2015-12-03 21:37:27</gmt_created>          <changed>1475894757</changed>          <gmt_changed>2016-10-08 02:45:57</gmt_changed>      </item>          <item>          <nid>131271</nid>          <type>image</type>          <title><![CDATA[Chicken Vocalization3]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[bird-vocalization158.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/bird-vocalization158_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/bird-vocalization158_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/bird-vocalization158_0.jpg?itok=2UpliOEH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Chicken Vocalization3]]></image_alt>                    <created>1449178647</created>          <gmt_created>2015-12-03 21:37:27</gmt_created>          <changed>1475894757</changed>          <gmt_changed>2016-10-08 02:45:57</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="33961"><![CDATA[chicken]]></keyword>          <keyword tid="33981"><![CDATA[David Anderson]]></keyword>          <keyword tid="1925"><![CDATA[Electrical and Computer Engineering]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="668"><![CDATA[poultry]]></keyword>          <keyword tid="169432"><![CDATA[signal processing]]></keyword>          <keyword tid="33971"><![CDATA[Wayne Daley]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="132601">  <title><![CDATA[Malware Intelligence System Enables Organizations to Share Threat Information]]></title>  <uid>27303</uid>  <body><![CDATA[<p>As malware threats expand into new domains and increasingly focus on industrial espionage, Georgia Tech researchers are launching a new weapon to help battle the threats: a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.</p><p>Known as Titan, the system will be at the center of a security community that will help create safety in numbers as companies large and small add their threat data to a knowledge base that will be shared with all participants. Operated by security specialists at the <a href="http://www.gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI), the system builds on a threat analysis foundation – including a malware repository that analyzes and classifies an average of 100,000 pieces of malicious code each day.</p><p>“As a university, Georgia Tech is uniquely positioned to take this white hat role in between industry and government,” said Andrew Howard, a GTRI research scientist who is part of the Titan project. “We want to bring communities together to break down the walls between industry and government to provide a trusted, sharing platform.”</p><p>Members contributing information will do so anonymously so other members won’t know which specific organizations have been attacked. GTRI will independently verify information provided to Titan and carefully vet the members of the community before they are allowed to participate.</p><p>“People tend to think that if an organization gets hit, it was because they had poor security measures,” said Christopher Smoak, a GTRI research scientist who heads up the Titan project. “That’s not necessarily true, because a variety of factors contribute to intrusions. But until we get to the point that there’s no longer a stigma attached to having an infiltration, people are going to want anonymity to participate.”</p><p>In addition to receiving information about attacks and responses at other organizations, members will receive quick reports on malware samples they submit. Based on what they have learned from the malware repository and by reverse-engineering malicious code, GTRI researchers will be able to provide information on the potential harm from an attack, the likely source, the best remedy for it and the risks to the organization.</p><p>“We hope to provide information about the trends that organizations can expect to see, and help them prioritize what they should do to address the risks,” said Howard. “We have a significant system behind the scenes to facilitate the exchange of information.”</p><p>Titan will be especially valuable to smaller organizations that lack the resources to operate their own security evaluation labs, though all members will benefit from sharing information. GTRI information security researchers collaborate with the <a href="http://www.gtisc.gatech.edu/">Georgia Tech Information Security Center </a>(GTISC), which expands the depth of knowledge.</p><p>“GTRI will maintain the shared resources that companies can use to help solve their own problems,” Smoak noted. “We’ll have many organizations contributing to this community, and everyone getting information out; it will really benefit everyone.”</p><p>Companies today have two primary concerns about malicious software, Howard said. The first is for the loss of intellectual property, such as plans for a new product or bidding documents for a major project. The second is a compromise of the web infrastructure that many companies rely on to do business.</p><p>Titan will also help companies educate their computer users about such risks as spear-phishing, which uses email that appears to be from a trusted colleague or friend to trick users into taking a risky action, such a opening an infected attachment. The system will alert companies to the newest threat trends so they can warn their users, and identify the IP addresses that malicious software is communicating with.</p><p>“Spear-phishing is very difficult to defend against, because all it takes is one person clicking on something that lets malware into the network,” Smoak said. “It’s difficult to train a large workforce with varying skill sets to identify the very small nuances that indicate these emails are malicious.”</p><p>GTRI has been analyzing the malware attacking Windows-based computers for years. Now the analysts are seeing an increase in malicious code designed for Android-based devices – and for Macintosh computers, which previously hadn’t been high-priority targets.</p><p>“We see Android malware in its infancy right now,” said Smoak. “We see what it is doing and how it is working, and we can draw parallels to what we saw earlier with the Windows-based malware. We can probably expect to see the Android and Mac malware follow a similar path.”</p><p>The danger may be especially great for the users of computer systems that previously had not worried much about malware.</p><p>“For Macintosh systems, the threats are starting to get scarier,” Howard said. “When more malware authors shift their focus to this platform, a lot of people who thought they were safe by not using the Windows OS will be caught off-guard.”</p><p>Titan now includes half a dozen Fortune 500 members, along with other government and nonprofit organizations. Smoak and Howard have been getting feedback from those members as they’ve built the system, which will be formally launched in a few months.</p><p>“We are looking for additional industry partners to help us use the tool and help refine the system,” said Howard. “We believe that members of this community will come together to help each other strengthen defenses.”</p><p>A determined hacker will probably succeed in compromising most corporate computer networks, but the researchers believe Titan can help companies make that as difficult as possible.</p><p>“You may not be able to completely prevent an attack, but you can have a higher wall and stronger defense,” Howard said. “Hackers tend to go after the low-hanging fruit, so they will attack the companies that are the easiest to attack. We believe that our community can help all the members strengthen their defenses.”</p><p><strong>Research News &amp; Publications Office</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>75 Fifth Street, N.W., Suite 314</strong><br /><strong>Atlanta, Georgia&nbsp; 30308&nbsp; USA</strong><br /><br /><strong>Media Relations Contacts</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Abby Robinson (404-385-3364)(<a href="mailto:abby@innovate.gatech.edu">abby@innovate.gatech.edu</a>) or Kirk Englehardt (404-894-6015)(<a href="mailto:kirk.englehardt@comm.gatech.edu">kirk.englehardt@comm.gatech.edu</a>).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1337811432</created>  <gmt_created>2012-05-23 22:17:12</gmt_created>  <changed>1475896338</changed>  <gmt_changed>2016-10-08 03:12:18</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have launched a new weapon designed to help companies fight back against malware threats.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have launched a new weapon designed to help companies fight back against malware threats.]]></sentence>  <summary><![CDATA[<p>As malware threats expand and increasingly focus on industrial espionage, Georgia Tech researchers are launching a new weapon to help battle the threats: a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.</p>]]></summary>  <dateline>2012-05-23T00:00:00-04:00</dateline>  <iso_dateline>2012-05-23T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-05-23 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Titan intelligence system will help companies and government organizations]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News &amp; Publications Office</p><p>(404) 894-6986</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>132591</item>          <item>132581</item>      </media>  <hg_media>          <item>          <nid>132591</nid>          <type>image</type>          <title><![CDATA[Titan Malware Intelligence System2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[titan106.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/titan106_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/titan106_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/titan106_0.jpg?itok=QBTK2pGY]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Titan Malware Intelligence System2]]></image_alt>                    <created>1449178659</created>          <gmt_created>2015-12-03 21:37:39</gmt_created>          <changed>1475894520</changed>          <gmt_changed>2016-10-08 02:42:00</gmt_changed>      </item>          <item>          <nid>132581</nid>          <type>image</type>          <title><![CDATA[Titan Malware Intelligence System]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[titan165.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/titan165_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/titan165_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/titan165_0.jpg?itok=z_x8XSX3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Titan Malware Intelligence System]]></image_alt>                    <created>1449178659</created>          <gmt_created>2015-12-03 21:37:39</gmt_created>          <changed>1475894528</changed>          <gmt_changed>2016-10-08 02:42:08</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="34351"><![CDATA[threat intelligence]]></keyword>          <keyword tid="13302"><![CDATA[Titan]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="128661">  <title><![CDATA[Georgia Tech/Microsoft Study Shows Bandwidth Caps Create Uncertainty, Risky Decisions]]></title>  <uid>27560</uid>  <body><![CDATA[<p>Recently, many U.S. Internet service providers have fallen in line with their international counterparts in capping monthly residential broadband usage. A new study by a Georgia Tech researcher, conducted during an internship at Microsoft Research, shows such pricing models trigger uneasy user experiences that could be mitigated by better tools to monitor data usage through their home networks.</p><p>Home users, the study found, typically manage their capped broadband access against three uncertainties—invisible balances, mysterious processes and multiple users—and these uncertainties have predictable impacts on household Internet use and can force difficult choices on users. Given the undeniable trend in both Internet norms (such as cloud-based applications) and home-entertainment delivery toward greater broadband requirements, the study seeks to create awareness and empathy among designers and researchers about the experience of Internet use under bandwidth caps.&nbsp;</p><p>Marshini Chetty, <a href="http://www.cc.gatech.edu/people/marshini-chetty" target="_self">a postdoctoral researcher in Georgia Tech’s School of Interactive Computing</a>, interviewed 12 households in South Africa, a country in which broadband caps were universal until February 2010. Typically, the caps set by South African ISPs are severe with some plans only offering 1 GB of data per month. At the time of the study, the caps ranged up to 9GB of data, far lower than the 150GB-250GB caps set by U.S. providers.</p><p>What Chetty and her collaborators found were coping mechanisms built into South Africans’ daily lives in order to manage their online activities under the caps. For example, some would routinely “top up” their accounts (pay additional fees for incremental cap increases), while others would visit family members to use their Internet accounts, or switch from desktop connectivity to smartphones. And with few (if any) ways for customers to monitor Internet usage throughout the month, their access often would be cut off in the middle of performing an online activity.</p><p>“People’s behavior does change when limits are placed on Internet access—just like we’ve seen happen in the smartphone market—and many complain about usage-based billing, but no one has really studied the effects it has on consumer activity,” said Chetty, who earned her Ph.D. in computer science from Georgia Tech in 2011. “We would also hear about people ‘saving’ bandwidth all month and then binge downloading toward the end of their billing period.”</p><p>“Mysterious processes” refers to customers’ inability to determine which applications are eating up their bandwidth, ranging from being unaware that streaming video or downloading songs consumes much more data than normal web browsing, to not knowing that many background applications (such as automatic software updates) count against the monthly cap.</p><p>“We were surprised to learn that many of the households we studied chose not to perform regular software updates in order to manage their cap,” Chetty said. “This activity can be benign for some applications, inadvisable for others and downright dangerous in certain cases. For example, not installing security patches on your system can leave you vulnerable to viruses and other sorts of cyber attacks.” Chetty suggested that the frequency of such risky behaviors among the broader population of metered/capped Internet users should be assessed via follow-up scientifically representative surveys.</p><p>Finally, in households with multiple Internet users, it can be difficult for the heads of the household to manage overall activity when they are not fully aware of each member’s Internet use. As with other consumable resources in a household, from milk to hot water, the apportionment of "fair" amounts of bandwidth reflects family practices and requires a fair bit of nuance, varying by family style and composition.</p><p>“As ISPs move more toward usage-based pricing, we need to keep in mind the reactive behaviors that consumers adopt and the consequences of those behaviors. Because when you have broadband caps, you will use the Internet differently,” Chetty said. “This study was performed in South Africa, and although the caps are higher in the United States, there are still instances where people are hitting them. So if you’re going to have caps, you should empathize with your users and offer ways for customers to see how their data are being used and who is using them.” More tools are becoming available, from ISPs, within operating systems and from third parties; but this is one of the first academic studies that systematically reveals why there is a demand for such tools, and why they are important to users.</p><p>The study’s findings are summarized in the paper, “’You’re Capped!’ Understanding the Effects of Bandwidth Caps on Broadband Use in the Home,” which Chetty will present on May 10 at the <a href="http://chi2012.acm.org/" target="_blank">2012 ACM SIGCHI Conference on Human Factors in Computing Systems</a> (CHI 2012), being held May 5-10 in Austin, Texas. Chetty’s coauthors include Beki Grinter, professor in the Georgia Tech School of Interactive Computing, and Richard Banks, A.J. Bernheim Brush and Jonathan Donner from Microsoft Research. The paper is <a href="http://chi2012.gatech.edu/" target="_blank">one of nine Georgia Tech entries in the main program of CHI 2012</a>.</p>]]></body>  <author>Jason Maderer</author>  <status>1</status>  <created>1336385645</created>  <gmt_created>2012-05-07 10:14:05</gmt_created>  <changed>1475896329</changed>  <gmt_changed>2016-10-08 03:12:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Better home network management tools could mitigate impact of capped broadband service on users.]]></teaser>  <type>news</type>  <sentence><![CDATA[Better home network management tools could mitigate impact of capped broadband service on users.]]></sentence>  <summary><![CDATA[<p><em>A new study by a Georgia Tech researcher shows that capped broadband pricing triggers uneasy user experiences that could be mitigated by better tools to monitor data usage through their home networks. </em></p>]]></summary>  <dateline>2012-05-07T00:00:00-04:00</dateline>  <iso_dateline>2012-05-07T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-05-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Home bandwidth management tools becoming more important for users]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[mterraza@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Michael Terrazas<br />College of Computing<a href="mailto:mterraza@cc.gatech.edu"><br />mterraza@cc.gatech.edu</a><br />404-245-0707</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>128651</item>      </media>  <hg_media>          <item>          <nid>128651</nid>          <type>image</type>          <title><![CDATA[Marshini Chetty - CHI release 2012]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[marshini_chetty_2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/marshini_chetty_2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/marshini_chetty_2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/marshini_chetty_2_0.jpg?itok=IdS68E3x]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Marshini Chetty - CHI release 2012]]></image_alt>                    <created>1449178622</created>          <gmt_created>2015-12-03 21:37:02</gmt_created>          <changed>1475894754</changed>          <gmt_changed>2016-10-08 02:45:54</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.cc.gatech.edu/]]></url>        <title><![CDATA[College of Computing]]></title>      </link>          <link>        <url><![CDATA[http://www.ic.gatech.edu/]]></url>        <title><![CDATA[School of Interactive Computing]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="3388"><![CDATA[Broadband]]></keyword>          <keyword tid="14894"><![CDATA[home networks]]></keyword>          <keyword tid="32731"><![CDATA[internet service providers]]></keyword>          <keyword tid="32721"><![CDATA[ISPs]]></keyword>          <keyword tid="9065"><![CDATA[kermit]]></keyword>          <keyword tid="12086"><![CDATA[Marshini Chetty]]></keyword>          <keyword tid="335"><![CDATA[Microsoft]]></keyword>          <keyword tid="166848"><![CDATA[School of Interactive Computing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="126341">  <title><![CDATA[How Twitter Broke Its Biggest Story, #WeGotBinLaden]]></title>  <uid>27560</uid>  <body><![CDATA[<p>Nearly a year after U.S. Special Forces killed Osama bin Laden, the events of May 1, 2011 remain one of the busiest traffic periods in Twitter history. More than 5,000 tweets were sent per second when Twitter became the first source with news of bin Laden’s death. But how did the news break and quickly spread across the Twittersphere?</p><p>A team of Georgia Tech researchers, together with colleagues at Microsoft Research Asia and University of California-Davis, looked at more than 600,000 tweets for answers. By analyzing tweets sent during a two-hour time frame beginning just minutes before the first rumor, they found that opinion leaders and celebrities played key roles. Their data also shows that the Twitterverse was overwhelmingly convinced the news of bin Laden’s death was true, even before it was confirmed on television.</p><p>The study confirms the widely held belief that Keith Urbahn (@keithurbahn), an aide to former Secretary of Defense Donald Rumsfeld, was indeed the first person to break the news on Twitter. His tweet was sent at 10:24 p.m. Eight minutes later, a CBS producer (@jacksonjk) tweeted her own confirmation. When a reporter with The New York Times (@brianstelter) retweeted both reports, the news began to spread more widely. &nbsp;</p><p>“Rumors spreading on Twitter is one thing,” said Mengdie Hu, a Ph.D. candidate in the School of Interactive Computing who led the study. “Determining if they are true is another, especially in this era of social media and the rush to break news.”</p><p>To make a determination, Hu and her team used machine-learning methods to examine more than 400,000 English tweets in the sample. If the message mentioned the death as a fact or in very confident terms, it was classified as “certain.” If any hesitation or rumors were mentioned, the tweet was sorted as “uncertain.” Within minutes of Urbahn’s post, 50 percent of tweets were certain. By the time TV networks broke into programming 21 minutes later, nearly 80 percent were already sure that bin Laden was dead. The number peaked to just over 80 percent after TV made it official.</p><p>“We believe Twitter was so quick to trust the rumors because of who sent the first few tweets,” said Hu. “They came from reputable sources. It’s unlikely that a CBS News producer or New York Times reporter would spread rumors of something so important and risk jeopardizing their reputation. Twitter saw their credentials and quickly believed the news was true.”</p><p>Also, although nearly everyone on Twitter was talking about the news, a group of 100 “elite users” was actually driving the discussion. Nearly 20 percent of all tweets mentioned one of these elite users. Unsurprisingly, media outlets such as CNN, CNN Espanol and the New York Times led the way, especially in the minutes before and after the TV announcement. But within a half hour of the TV reports, celebrities surpassed media mentions and carried the discussion throughout the night. They included comedian Steve Martin and reality stars Kim Kardashian and Paul “DJ Pauly D” DelVecchio of the “Jersey Shore.”</p><p>“The celebrities weren’t the first people to arrive at the party,” said John Stasko, Hu’s advisor and professor in the School of Interactive Computing. “But they stayed the longest and brought the most guests.”</p><p>The findings surprised the researchers, especially because the topic was political and the majority of the celebrities had nothing to do with politics.</p><p>Hu and Stasko are using the analysis to develop software that can measure moods and influential people on social media. Marketing companies could use the tools while unveiling new products or searching for celebrity endorsers.</p><p>Hu will present the findings in Austin, Texas, at the Association for Computing Machinery’s (ACM) Special Interest Group on Computer Human Interaction (SIGCHI) conference in May.</p><p>For more Georgia Tech papers and research that will be presented at CHI, click <a href="http://chi2012.gatech.edu/">here</a>.</p><p>&nbsp;</p>]]></body>  <author>Jason Maderer</author>  <status>1</status>  <created>1335438033</created>  <gmt_created>2012-04-26 11:00:33</gmt_created>  <changed>1475896324</changed>  <gmt_changed>2016-10-08 03:12:04</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[By analyzing 600,000 tweets, researchers determine how Twitter broke and spread the news of Osama bin Laden's death.]]></teaser>  <type>news</type>  <sentence><![CDATA[By analyzing 600,000 tweets, researchers determine how Twitter broke and spread the news of Osama bin Laden's death.]]></sentence>  <summary><![CDATA[<p>By analyzing 600,000 tweets sent on the night U.S. Special Forces captured Osama bin Laden, researchers studied how Twitter broke the story and spread the news. Their data also shows that the Twitterverse was overwhelmingly convinced the news of bin Laden’s death was true, even before it was confirmed on television.</p>]]></summary>  <dateline>2012-04-26T00:00:00-04:00</dateline>  <iso_dateline>2012-04-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2012-04-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jason.maderer@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jason Maderer<br />Media Relations<br /><a href="mailto:maderer@gatech.edu">maderer@gatech.edu</a><br />404-385-2966</p><p>&nbsp;</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>126351</item>      </media>  <hg_media>          <item>          <nid>126351</nid>          <type>image</type>          <title><![CDATA[John Stasko]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[stasko.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/stasko_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/stasko_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/stasko_0.jpg?itok=N5um48yw]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[John Stasko]]></image_alt>                    <created>1449178604</created>          <gmt_created>2015-12-03 21:36:44</gmt_created>          <changed>1475894749</changed>          <gmt_changed>2016-10-08 02:45:49</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://chi2012.gatech.edu/]]></url>        <title><![CDATA[Georgia Tech CHI Papers]]></title>      </link>          <link>        <url><![CDATA[http://www.cc.gatech.edu/]]></url>        <title><![CDATA[College of Computing]]></title>      </link>          <link>        <url><![CDATA[http://www.ic.gatech.edu/]]></url>        <title><![CDATA[School of Interactive Computing]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="166848"><![CDATA[School of Interactive Computing]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>          <keyword tid="314"><![CDATA[twitter]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="72473">  <title><![CDATA[New Software Improves Healthcare Delivery in Africa]]></title>  <uid>27560</uid>  <body><![CDATA[<p>Researchers from the Georgia Tech College of Computing,working in partnership with the Centers for Disease Control and Prevention(CDC), have developed a digital data tracking system to assist low-resourceclinical laboratories in developing countries.</p><p>Sub-SaharanAfrica suffers from some of the greatest health challenges in the world, makingthe need for efficient healthcare delivery especially vital. However, mosthospitals and labs in the region use paper logs and manual entries for trackingdata, methods that take up valuable time and are prone to errors and loss ofdata. In an effort to increase efficiency and allow more patients to be testedaccurately, a team led by Professor Santosh Vempala in the School of ComputerScience developed the Basic Laboratory Information System (BLIS). </p><p>During asix-month pilot implementation in three hospital labs in Cameroon, BLISaccounted for a 66 percent decrease in errors and a 50 percent reduction inemployee workload. This led to significantly reduced waiting times, allowing twice as many patients to get testeddaily as compared to pre-BLIS operations. </p><p>“BLIS iseasy to use and intuitive,” Sidney Atah, BLIS project coordinator in Cameroon, said.“When configuring the software, you control the behavior and appearance of thesystem without modifying the program.”</p><p>Built fromfreely available, open-source components, BLIS digitizes the traditional datatracking system, resulting in a sustainable program that tracks specimens,results and workflow. Unlike similar software from commercial providers, BLISis extremely cost-effective, works on limited resources, and requires virtuallyno training. Additionally, the system is designed to work effectively incountries with very little IT infrastructure and limited connectivity.</p><p>“Integratingdata tracking software in these labs has been difficult in the past, mainly dueto high costs and the failure of other system providers to incorporate thevarying needs of labs and hospitals from different countries and cultures,” saidVempala, a professor in Georgia Tech’s School of Computer Science. “We wantedto design an extremely configurable system that would adapt to fit the needs ofits users in order to improve workflow and patient care.” </p><p>Instead offollowing a one-size-fits-all approach, BLIS was designed to enable each lab orcountry to customize and configure the system in a way that suits them best. Thedigital program seeks regular feedback from users and then incorporates thisfeedback through system updates, resulting in a program that evolves with theneeds of the lab. </p><p>Over thepast year, BLIS has been implemented in nine laboratories across three Africancountries: Cameroon, Tanzania and Uganda. Vempala and his team have worked withlocal lab technicians, representatives from each country’s ministry of healthand local implementing partners to integrate BLIS into various labs across thethree countries. </p><p>Dr.Maurice Mouladje, lab director for Buea Regional Hospital in Cameroon, saysBLIS has had a positive impact on both patients and staff. Physicians are ableto attend to patients promptly, and BLIS provides flexibility in lab technicianworkload. Similarly, Atah notes that BLIS’s reach goes beyond increasedefficiency and accuracy. </p><p>“BLIShas added confidence and hope in the quality of results and the ability of ourinstitutions to provide quality care to patients,” Atah says. “It makes me feellike nothing is impossible to achieve; it is our African dream.”</p><p>Byearly 2012, Vempala and his team of Georgia Tech graduate students, AmolShintre, Akshay Phalnikar and Anu Nair, plan to expand BLIS to labs in Ghana,in addition to incorporating the software in more clinics in Cameroon, Tanzaniaand Uganda. In the next year, he hopes to make BLIS available to any lab in thedeveloping world, which will also include access to local technical support fora minimal fee<em>. </em></p><p>BLISis a part of Georgia Tech’s Computing for Good (C4G) initiative, which applies computingto social causes to improve quality of life around the world. For moreinformation about BLIS, including user feedback and access to the software,visit: <a href="http://blis.cc.gatech.edu/">http://blis.cc.gatech.edu</a>.</p><p><strong>Aboutthe Georgia Tech College of Computing</strong><strong></strong></p><p>TheGeorgia Tech College of Computing is a national leader in the creation ofreal-world computing breakthroughs that drive social and scientific progress.With its graduate program ranked ninth nationally by <em>U.S. News and World Repor</em>t, the College’s unconventional approachto education is defining the new face of computing by expanding the horizons oftraditional computer science students through interdisciplinary collaborationand a focus on human-centered solutions. For more information about the GeorgiaTech College of Computing, its academic divisions and research centers, pleasevisit http://<a href="http://www.cc.gatech.edu/">www.cc.gatech.edu</a>.</p>]]></body>  <author>Jason Maderer</author>  <status>1</status>  <created>1320773623</created>  <gmt_created>2011-11-08 17:33:43</gmt_created>  <changed>1475896238</changed>  <gmt_changed>2016-10-08 03:10:38</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Digital data tracking system assists low-resource clinical laboratories in developing countries.]]></teaser>  <type>news</type>  <sentence><![CDATA[Digital data tracking system assists low-resource clinical laboratories in developing countries.]]></sentence>  <summary><![CDATA[<p>Researchers from the Georgia Tech College of Computing, working inpartnership with the Centers for Disease Control and Prevention (CDC), havedeveloped a digital data tracking system (BLIS) to assist low-resource clinicallaboratories in developing countries. During a six-month pilot implementation in three hospital labs inCameroon, BLIS accounted for a 66 percent decrease in errors and a 50 percentreduction in employee workload.</p>]]></summary>  <dateline>2011-11-08T00:00:00-05:00</dateline>  <iso_dateline>2011-11-08T00:00:00-05:00</iso_dateline>  <gmt_dateline>2011-11-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Georgia Tech implements digital data tracking system in developing African countries]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[mdye@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Michaelanne Dye<br />Georgia Tech College of Computing<br />404-385-4015<br /><a href="mailto:mdye@cc.gatech.edu">mdye@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>72466</item>      </media>  <hg_media>          <item>          <nid>72466</nid>          <type>image</type>          <title><![CDATA[BLIS Photo 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[blis.2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/blis.2_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/blis.2_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/blis.2_0.jpg?itok=FxxB82T9]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[BLIS Photo 2]]></image_alt>                    <created>1449177930</created>          <gmt_created>2015-12-03 21:25:30</gmt_created>          <changed>1475894658</changed>          <gmt_changed>2016-10-08 02:44:18</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.cc.gatech.edu/]]></url>        <title><![CDATA[College of Computing]]></title>      </link>          <link>        <url><![CDATA[http://www.scs.gatech.edu/]]></url>        <title><![CDATA[Georgia Tech School of Computer Science]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="167405"><![CDATA[santosh vempala]]></keyword>          <keyword tid="166941"><![CDATA[School of Computer Science]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="71078">  <title><![CDATA[Crowdsourcing Democracy Through Social Media]]></title>  <uid>27174</uid>  <body><![CDATA[<p>ATLANTA – Oct. 11, 2011 – Today the citizens of Liberia will participate in just their second presidential election since the country emerged from a brutal civil war in 2003, and in such an environment the specter of violence or other unrest is never far away. But what if social media, a Georgia Tech professor is asking, could identify and even help prevent dangerous situations from occurring?</p><p>When nearly 40 million Nigerians took to the polls last April to elect a new president, many of them went online to share comments about their chosen candidates on blogs, Twitter or other social media platforms. They also used these new media tools to report what they saw. “Listening” to much of it was Georgia Tech Associate Professor Michael Best, which just might have saved a few lives.</p><p>During the election, Best provided technical support for a Nigerian group that wanted to use social media as a means for tracking the election process and identifying any problems that cropped up. Best and his team of researchers designed a social media aggregator tool that could pull content from about 20 different sources (including Twitter) and analyze the data in real time using keywords.</p><p>At the peak of activity, the aggregator tracked about 50 reports per second and analyzed them based on keywords and (sometimes) location data. The Nigerian Social Media Tracking Centre, formed just before the election by the organization Best was supporting, forwarded along confirmable reports of election irregularities and ultimately reports of violence to Nigerian authorities. All together the aggregator collected about 750,000 reports containing pre-identified keywords, and following the election the SMTC issued a summary report that listed a series of recommendations for using social media and instant messaging to improve future election experiences, such as:</p><ul><li>Training civilian groups and voters to tweet election results</li><li>Organizing SMS group accounts for both national and local election officials</li><li>Establishing a central database to collate election results, and having local precincts send results via SMS</li><li>Advising international monitoring organizations to partner with domestic groups that will monitor social media</li></ul><p>Using social media as a means to gauge public response to political events is nothing new, but Best’s team is one of the first to use the practice in real time to help improve the electoral process itself, acknowledging that civilian reports can provide critical information. If violence erupts, the hours or even minutes saved by having identified the situation through social media posts could make a significant difference in response.</p><p>“Nigeria showed that this technology has legitimate and useful applications for monitoring elections or keeping a real-time pulse on any number of political or community issues,” said Best, an associate professor in the School of Interactive Computing and the Sam Nunn School of International Affairs. “Our ultimate goal is to delve deeper into the particulars of this, examining the information’s accuracy, depth, timeliness and scope, and comparing it along those dimensions to other sources of information.”</p><p>Tangibly, Best and team want to produce open-source software that can be used to monitor major events as a complementary tool to traditional monitoring techniques. For example, the National Democratic Institute and the European Union both sent observers to Nigeria for its April elections, and today Liberia will likewise see international teams on the ground, monitoring and reporting on the country’s electoral processes. How can crowdsourced election data compliment the work of trained formal observer missions? What impact will that data have? And what impact will Friday’s announcement that President Ellen Johnson Sirleaf will receive the Nobel Peace Prize have on the election?</p><p>“The nongovernmental organizations [NGOs] that do election monitoring are understandably leery of formally using this technology right now, because they don’t want to risk their data being tainted with unreliable citizen reports,” said Thomas Smyth, a Ph.D. student in Best’s lab. “However our research could open up new understandings of how social media function in election-like situations, and as the explosion of social media causes NGOs to refine their policies, it could be of interest to them.”</p><p>The stakes for Liberia’s election appeared to rise again on Friday, when it was announced that President Ellen Johnson Sirleaf will receive the Nobel Peace Prize. When the polls open at approximately 3 a.m. EST on Oct. 11, Best and a team of undergraduate and graduate students will be ready in a “situation room” on the Georgia Tech campus. Among the outlets to be followed are Twitter, Facebook public groups, SMS messaging and several other blogs and social media websites, including the open-source platform Ushahidi, popular in several African nations.</p><p>As reports begin to filter in, the aggregator will use posts clustering around certain keywords as evidence in a real-time organic catalogue of “curated incidents.” If the team identifies a situation it decides should be reported to Liberian authorities, Best has partnered with iLab Liberia, an information technology support organization, which will staff a “response room” in country. </p><p>“Social media and aggregate text messaging can, in a very real sense, be construed as a ‘cultural consciousness,’ and our goal is to show how you can take advantage of that for reasons other than marketing products or identifying pop culture trends,” Best said. “As we’re seeing through the ongoing ‘Arab Spring,’ these new technologies can be vital tools in service of democracy.”</p><p>In 2012, Best hopes to employ the aggregator in monitoring elections in Kenya, Senegal and the new nation of South Sudan.</p><p>###</p><p><strong>About the Georgia Tech College of Computing</strong></p><p>The Georgia Tech College of Computing is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 10th nationally by U.S. News and World Report, the College’s unconventional approach to education is defining the new face of computing by expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human centered solutions. For more information about the Georgia Tech College of Computing, its academic divisions and research centers, please visit <a href="http://www.cc.gatech.edu" title="http://www.cc.gatech.edu">http://www.cc.gatech.edu</a>.</p>]]></body>  <author>Mike Terrazas</author>  <status>1</status>  <created>1318321048</created>  <gmt_created>2011-10-11 08:17:28</gmt_created>  <changed>1475896226</changed>  <gmt_changed>2016-10-08 03:10:26</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Professor Michael Best is using social media to monitor elections in Liberia to identify dangerous situations.]]></teaser>  <type>news</type>  <sentence><![CDATA[Professor Michael Best is using social media to monitor elections in Liberia to identify dangerous situations.]]></sentence>  <summary><![CDATA[<p>ATLANTA – Oct. 11, 2011 – Today the citizens of Liberia will elect a president, eight years after the end of its civil war, with the specter of violence still hanging overhead. But what if social media, Professor Michael Best (<em>Interactive Computing</em>) is asking, could identify and even help prevent dangerous situations from occurring? <em>Source: Office of Communications</em></p>]]></summary>  <dateline>2011-10-11T00:00:00-04:00</dateline>  <iso_dateline>2011-10-11T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-10-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Georgia Tech team uses Twitter, blogs to monitor elections in developing nations]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:mterraza@cc.gatech.edu">Michael Terrazas</a></p><p>404-245-0707</p><p><a href="mailto:mterraza@cc.gatech.edu">mterraza@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>71082</item>      </media>  <hg_media>          <item>          <nid>71082</nid>          <type>image</type>          <title><![CDATA[Social Media Tracking Liberia 10-11-11]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[imgp1058.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/imgp1058_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/imgp1058_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/imgp1058_0.jpg?itok=78CFvwG_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Social Media Tracking Liberia 10-11-11]]></image_alt>                    <created>1449177348</created>          <gmt_created>2015-12-03 21:15:48</gmt_created>          <changed>1475894628</changed>          <gmt_changed>2016-10-08 02:43:48</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="14666"><![CDATA[e-Democracy]]></keyword>          <keyword tid="906"><![CDATA[Liberia]]></keyword>          <keyword tid="907"><![CDATA[Michael Best]]></keyword>          <keyword tid="166941"><![CDATA[School of Computer Science]]></keyword>          <keyword tid="166848"><![CDATA[School of Interactive Computing]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="70785">  <title><![CDATA[Georgia Tech Wins $2 Million in NSF Grants to Improve Computer Science Education]]></title>  <uid>27560</uid>  <body><![CDATA[<p>The Georgia Institute of Technology has been awarded two highlyselective National Science Foundation (NSF) grants totaling $2 million. Theawards, designated for the Ivan Allen College of Liberal Arts and the Collegeof Computing, will fund two projects intended to transform how students learncomputer science in American high schools.&nbsp;</p><p><a href="http://www.youtube.com/watch?v=mHX0ozotK1o">EarSketch</a>,a project in Ivan Allen College, is designed to encourage Atlanta’sAfrican-American high schoolers to study computer science. The program willallow students to remix hip hop music by writing computer code. EarSketch isbased on research by Georgia Tech that shows the relationship between gamingand an eventual interest in computer science is not as strong as may have beenpreviously assumed, especially for minorities. </p><p>“Traditional approaches to teaching computer science aredismal in engaging non-white male students, and the numbers forAfrican-American males are relatively low compared to other ethnic groups,”said Brian Magerko, assistant professor of digital media in the IAC School ofLiterature, Communication and Culture. Magerko, the principal investigator onthe project, is working with co-investigator Jason Freeman, an assistantprofessor in the School of Music in the College of Architecture.&nbsp;</p><p>“We believe that by leveraging the collaborative nature of remixcomposition and musically oriented computer programming, EarSketch may providea successful alternative to the cultural issues that computer games have in theengagement of minorities,” said Magerko. </p><p>EarSketch will teach students how to use a digital audioworkstation and to control musical loops and beats by writing small bits ofprogramming code. The project&nbsp;involvescollaboration with Mike Reilly from Lanier High School, where the software andcurriculum will be piloted in 2014. &nbsp;</p><p>The College of Computing’s $1 million grant will be used toaddress a different issue: a significant shortage of high school computerscience teachers in the United States. According to the College Board, thereare only 2,000 computer science teachers at the Advanced Placement (AP) levelamong the nation’s 25,000 high schools. NSF has a goal of having 10,000 highschool computer science teachers in 10,000 U.S. schools by the year 2015. </p><p>Mark Guzdial, a professor in the college’s School ofInteractive Computing, and Barbara Ericson, director of Computing Outreach,will oversee a three-year project that will investigate better ways to traincomputing teachers. Guzdial and Ericson are focused on creating new onlinemedia, allowing teachers to learn at their own pace rather than using a remoteclassroom model. </p><p>"The biggest challenge is learning computer science from adistance," said Guzdial. "Most training tools currently used—such asonline classes that require teachers to program code on their own with littleor no help—are ineffective. It's too hard for them. We're trying to find amiddle ground that will work with measurable learning and helping teacherssucceed."</p><p>For more information on the initiative, click <a href="http://home.cc.gatech.edu/csl/csLearning4U">here</a>. &nbsp;</p><p>Both projects are part of the NSF’s Computing Ed for 21<sup>st</sup>Century program, which aims to increase the number of students who plan tomajor in computing. According to the NSF, interest among college freshmen hasdeclined overall by 70 percent in the last decade. </p>]]></body>  <author>Jason Maderer</author>  <status>1</status>  <created>1317631709</created>  <gmt_created>2011-10-03 08:48:29</gmt_created>  <changed>1475896222</changed>  <gmt_changed>2016-10-08 03:10:22</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The grants will fund projects intended to transform high school computer science education.]]></teaser>  <type>news</type>  <sentence><![CDATA[The grants will fund projects intended to transform high school computer science education.]]></sentence>  <summary><![CDATA[<p>Georgia Tech has been awarded two highlyselective National Science Foundation grants totaling $2 million. Theawards, designated for the Ivan Allen College of Liberal Arts and the Collegeof Computing, will fund two projects intended to change how high school students and teachers learncomputer science. </p>]]></summary>  <dateline>2011-10-04T00:00:00-04:00</dateline>  <iso_dateline>2011-10-04T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-10-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Highly Selective Grants Will Assist Nation’s High Schools]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jason.maderer@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jason Maderer, Media Relations<br />404-385-2966</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>65383</item>          <item>70812</item>          <item>63089</item>      </media>  <hg_media>          <item>          <nid>65383</nid>          <type>image</type>          <title><![CDATA[Mark Guzdial & Barb Ericson]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[DSC_0156.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/images/DSC_0156_0.JPG]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/DSC_0156_0.JPG]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/DSC_0156_0.JPG?itok=QeAwvhS8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Mark Guzdial & Barb Ericson]]></image_alt>                    <created>1449176831</created>          <gmt_created>2015-12-03 21:07:11</gmt_created>          <changed>1475894577</changed>          <gmt_changed>2016-10-08 02:42:57</gmt_changed>      </item>          <item>          <nid>70812</nid>          <type>image</type>          <title><![CDATA[Brian Magerko]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[brian_magerko.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/brian_magerko_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/brian_magerko_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/brian_magerko_1.jpg?itok=PUaWV9lr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Brian Magerko]]></image_alt>                    <created>1449177314</created>          <gmt_created>2015-12-03 21:15:14</gmt_created>          <changed>1475894602</changed>          <gmt_changed>2016-10-08 02:43:22</gmt_changed>      </item>          <item>          <nid>63089</nid>          <type>image</type>          <title><![CDATA[Jason Freeman]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Jason_Freeman_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Jason_Freeman_0_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Jason_Freeman_0_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Jason_Freeman_0_0.jpg?itok=zC3zUFu8]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Jason Freeman]]></image_alt>                    <created>1449176649</created>          <gmt_created>2015-12-03 21:04:09</gmt_created>          <changed>1475894552</changed>          <gmt_changed>2016-10-08 02:42:32</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.youtube.com/watch?v=mHX0ozotK1o]]></url>        <title><![CDATA[EarSketch Prototype Demonstration]]></title>      </link>          <link>        <url><![CDATA[http://www.eurekalert.org/pub_releases/2011-04/giot-gtf040611.php]]></url>        <title><![CDATA[Prior Award for Guzdial and Ericson]]></title>      </link>          <link>        <url><![CDATA[http://home.cc.gatech.edu/csl/csLearning4U]]></url>        <title><![CDATA[CSLearning4U]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="10665"><![CDATA[barbara ericson]]></keyword>          <keyword tid="14469"><![CDATA[Brian Magerko]]></keyword>          <keyword tid="926"><![CDATA[College of Architecture]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="11435"><![CDATA[Georgia Tech Ivan Allen College]]></keyword>          <keyword tid="1346"><![CDATA[Jason Freeman]]></keyword>          <keyword tid="10469"><![CDATA[Mark Guzdial]]></keyword>          <keyword tid="362"><![CDATA[National Science Foundation]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="85961">  <title><![CDATA[Pindrop Security: Georgia Tech Spinoff Secures Silicon Valley Funding for Phone Security Technology]]></title>  <uid>27303</uid>  <body><![CDATA[<p>How can you be sure that an incoming phone call is really from a customer and not an overseas criminal intent on fraud? For major financial services companies, that’s a growing concern as the telephone system adopts Internet technologies – and the security issues that come with them.</p><p>A startup company based on technology developed at Georgia Tech offers a solution to that challenge, and is quickly gaining traction from investors, financial services companies and the security industry. Using “acoustic fingerprint” detection techniques developed in the <a href="http://www.gtisc.gatech.edu">Georgia Tech Information Security Center</a> (GTISC), Pindrop Security says it can restore trust to the telephone network and help stem the tide of phone fraud.</p><p>Supported by a broad range of Georgia Tech initiatives, the company is currently raising a round of funding that includes California venture capital firm Andreessen Horowitz – which has also backed Facebook, Groupon and Twitter. It has also been chosen as a top ten “most innovative company” at one of the most prestigious information security events, the RSA Conference.</p><p>“We provide a way to detect, mitigate and stop phone fraud by identifying the characteristics of any phone call based on the device making it or the path the call takes,” said Vijay Balasubramaniyan, Pindrop’s CEO, who helped develop the technology as a Ph.D. student in the Georgia Tech <a href="http://www.cc.gatech.edu/">College of Computing</a>. “This information is useful in providing both forensic information about the call – whether it is from a landline, cell phone or voice-over-IP device – and the geography of the origin.”</p><p>Financial services companies depend on caller ID and other services to be sure callers making transactions such as activating credit cards are who they claim to be. But the advent of simple technologies for spoofing caller ID has raised major security concerns.</p><p>In the fall of 2010, Balasubramaniyan, GTISC director Mustaque Ahamad and School of Computer Science assistant professor Patrick Traynor raised the visibility of telephony security issues – and their proposed solutions – in a paper presented at a top security conference: the ACM Conference on Computer and Communication Security. </p><p>“The research project was to understand the security challenges of this new environment in which telephony, voice-over-IP, cellular and wireless technologies all come together,” explained Ahamad. “We all know about the security problems of the Internet. Telephony is increasingly going the way of the Internet and using many of the same protocols that we use for everything else.”</p><p>The paper sparked international media coverage, and after the conference, Balasubramaniyan, Ahamad and Traynor began getting phone calls from companies that were experiencing precisely the problems the researchers described. Because Pindrop’s solution doesn’t require changes to existing telephone networks, the technology was especially attractive.</p><p>“The fact that so many companies were asking about it suggested there was a definite need for this,” said Balasubramaniyan. “The banks reached out to us with their own specific issues. That showed us that they were already looking at various embodiments of the product.”</p><p>Convinced that they had something the commercial world needed, the researchers worked with the <a href="http://www.gtrc.gatech.edu/">Georgia Tech Research Corporation</a> (GTRC) to protect the intellectual property with patents. </p><p>In the spring of 2010, Keith McGreggor, director of the <a href="http://www.venturelab.gatech.edu/">Georgia Tech VentureLab</a> program, read the invention disclosures on the research, and reached out to Balasubramaniyan. VentureLab evaluates technology developed at Georgia Tech and helps faculty and research staff launch startups that are based on technology developed in the research program.</p><p>The researchers also had lunch with Stephen Fleming, a Georgia Tech vice president and executive director of the <a href="http://innovate.gatech.edu/">Enterprise Innovation Institute</a> (EI<sup>2</sup>), which houses Georgia Tech services for startup companies – including VentureLab.&nbsp; Fleming, a Georgia Tech graduate and former venture capitalist, began his career in the telecom industry and quickly understood both the technical issue and the potential startup opportunity.</p><p>With VentureLab staff connecting the fledgling company to relevant resources at Georgia Tech and elsewhere in the Atlanta community, Balasubramaniyan began what is often most the daunting challenge: raising money. Pindrop sought a grant from the National Science Foundation’s Small Business Innovation Research (SBIR) program, and received help in developing the application from the SBIR Assistance Program that is part of the Enterprise Innovation Institute. The company received $150,000, and was among approximately 10 percent of the submitted proposals to be funded by NSF. </p><p>VentureLab also connected Pindrop to additional early-stage funding from the <a href="http://www.gra.org/">Georgia Research Alliance</a> (GRA), and supported it in winning the startup competition operated by the GRA and Technology Association of Georgia (TAG). Beyond the additional $50,000 in funding from the competition, the GRA/TAG competition introduced Pindrop to the Atlanta community and provided important visibility with investors.</p><p>The company also obtained office space in the <a href="http://www.atdc.org">Advanced Technology Development Center</a> (ATDC) incubator in Technology Square. The space allowed it to hold down costs while expanding staff to six full-time and three part-time people. </p><p>In spring 2011, Pindrop was accepted into the inaugural class for <a href="http://www.flashpoint.gatech.edu">Flashpoint</a>, a new Georgia Tech accelerator that offers early-stage technology companies educational programs and mentoring from experienced entrepreneurs. That led to advice on a broad range issues that the founders were seeking to address.</p><p>“When we ran into an issue, such as how to create a marketing campaign with very little money, a person introduced to us by Flashpoint helped us with that,” recalled Balasubramaniyan, who has adeptly made the transition from researcher to entrepreneur.&nbsp; “The collective wisdom of that group of entrepreneurs has been a significant help.”</p><p>The company was also connected to its new chairman, Paul Judge, a Georgia Tech alumnus and entrepreneur with experience in security companies. And the connections made during the startup process brought Pindrop to the attention of Andreessen Horowitz, leading to the California firm’s first investment in the Atlanta technology community.&nbsp; To allow use of the acoustic fingerprint technology, Pindrop received a license from the Georgia Tech Research Corporation.</p><p>“Pindrop is a textbook example of how all the components of Georgia Tech’s commercialization infrastructure can work together to support researchers developing technology that has commercial applications,” said Fleming. “The founders of Pindrop have worked very hard to build the company. They took advantage of all of Georgia Tech’s entrepreneur services and used each one to build momentum.”</p><p>Pindrop’s accomplishments, including opening the door to Andreessen Horowitz, should provide encouragement to other Atlanta technology entrepreneurs, McGreggor said. </p><p>“Beyond helping Pindrop, this rare early investment from this prestigious Silicon Valley firm will offer others in the community a hopeful reminder that they could potentially also get this kind of investment,” he suggested. “Not every company has the potential to do that, but the community needs to see a local startup based on Georgia Tech research get this kind of a hit.”</p><p>Pindrop is the second company arising from the Georgia Tech Information Security Center to attract venture capital funding. The first, Damballa, is a network security company launched in 2006 by College of Computing professors Wenke Lee and Merrick Furst.</p><p>“We are in a space where the problems are real and the solutions we can produce offer a path to real impact, solving real problems,” said GTISC’s Ahamad. “We can produce innovations that go beyond writing papers for our peers.”</p><p>Atlanta has become a center for cyber-security companies, led by the success of Internet Security Systems, which was purchased by IBM for $1.3 billion.</p><p>“Pindrop is right in Atlanta’s sweet spot, building on the strengths of not only Georgia Tech, but also the city,” said Ahamad, who serves as the company’s chief scientist. “Atlanta is a great place to launch a security company.” <br /><br /><strong>Research News &amp; Publications Office<br />Georgia Institute of Technology<br />75 Fifth Street, N.W., Suite 314<br />Atlanta, Georgia&nbsp; 30308&nbsp; USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Abby Robinson (404-385-3364)(<a href="mailto:abby@innovate.gatech.edu">abby@innovate.gatech.edu</a>).</p><p><strong>Writer</strong>: John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1327418433</created>  <gmt_created>2012-01-24 15:20:33</gmt_created>  <changed>1475896222</changed>  <gmt_changed>2016-10-08 03:10:22</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A company based on Georgia Tech information security technology has secured funding from a prestigious California investor.]]></teaser>  <type>news</type>  <sentence><![CDATA[A company based on Georgia Tech information security technology has secured funding from a prestigious California investor.]]></sentence>  <summary><![CDATA[<p>A startup company based on technology developed at Georgia Tech offers a solution to the growing challenge of telephone security, and is quickly gaining traction from investors, financial services companies and the security industry</p>]]></summary>  <dateline>2012-01-24T00:00:00-05:00</dateline>  <iso_dateline>2012-01-24T00:00:00-05:00</iso_dateline>  <gmt_dateline>2012-01-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>John Toon</strong>, Research News &amp; Publications Office (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>)</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>85941</item>      </media>  <hg_media>          <item>          <nid>85941</nid>          <type>image</type>          <title><![CDATA[Pindrop Security]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[pindrop2804.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/pindrop2804_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/pindrop2804_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/pindrop2804_0.jpg?itok=kINqfx6T]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Pindrop Security]]></image_alt>                    <created>1449178110</created>          <gmt_created>2015-12-03 21:28:30</gmt_created>          <changed>1475894621</changed>          <gmt_changed>2016-10-08 02:43:41</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="4238"><![CDATA[atdc]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="17161"><![CDATA[flashpoint]]></keyword>          <keyword tid="10567"><![CDATA[Georgia Tech Information Security Center]]></keyword>          <keyword tid="2254"><![CDATA[gtisc]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="18281"><![CDATA[telephone security]]></keyword>          <keyword tid="4193"><![CDATA[venturelab]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="70403">  <title><![CDATA[Georgia Tech Researchers Receive Three NSF Emerging Frontiers Awards]]></title>  <uid>27206</uid>  <body><![CDATA[<p>The National Science Foundation (NSF) has awarded $6 million to fund three projects involving researchers from the Georgia Institute of Technology. Each four-year, $2 million grant was awarded through the NSF's Division of Emerging Frontiers in Research and Innovation (EFRI).</p><p>"The EFRI research teams will probe some profound aspects of the interface of biology and engineering," said Sohi Rastegar, director of EFRI. "If they are successful, the principles and theories uncovered in their investigations could unlock many technological opportunities."</p><p>This year, 14 transformative, fundamental research projects were awarded EFRI grants in two emerging areas: technologies that build on understanding of biological signaling, and machines that can interact and cooperate with humans.</p><p>The three Georgia Tech projects include:</p><ul><li>Developing a "therapeutic robot" to help rehabilitate and improve motor skills in people with mobility problems;</li><li>Creating wearable sensors that allow blind people to "see" with their hands, bodies or faces;</li><li>Generating and rigorously testing quantitative models that describe spatial and temporal regulation of cell differentiation in tissues.</li></ul><p>The therapeutic robot could enhance, assist and improve motor skills in humans with varying motor capabilities and deficits. The goal of the project is to program a humanoid rehabilitation robot to perform a "partnered box step," which is a defined pattern of weight shifts and directional changes, solely based on interpreting movement cues from subtle changes in forces between the hands and arms of the robot and the person.</p><p>To do this, researchers at Georgia Tech and Emory University will study how humans use their muscles to walk, balance and generate force signals with the hands for guidance when moving in cooperation with another person. They will also study "rehabilitative partnered dance," which has been specifically adapted to help improve gait and balance in individuals with motor impairments.</p><p>"Our vision is to develop robots that will interact with humans as both assistants and movement therapists," explained principal investigator Lena Ting, an associate professor in the Wallace H. Coulter Department of Biomedical Engineering at Georgia Tech and Emory University. "We expect our project to have a long-term impact on quality of life of individuals with movement difficulties, such as those caused by Parkinson's disease, stroke and injury by improving fitness, motor skills and social engagement."</p><p>Working with Ting on the project are Emory University School of Medicine (geriatrics) assistant professor Madeleine Hackney, Coulter Department of Biomedical Engineering assistant professor Charlie Kemp and Georgia Tech School of Interactive Computing assistant professor Karen Liu.</p><p>For the second project, researchers at Georgia Tech and The City College of New York will investigate devices for "alternative perception" and the principles underlying the human-machine interaction. Alternative perception combines electronics and the other senses to emulate vision. In addition to aiding the visually impaired, the findings are expected to have other applications, such as the development of intelligent robots.</p><p>The researchers plan to untangle how humans learn to coordinate input from their senses -- e.g. vision, touch -- with movements, like reaching for a glass or moving through a crowded room. They will then map out how machines, such as robots and computers, learn similar tasks, to model devices that can assist humans.</p><p>The team envisions a multifunctional array of sensors on the body and has already developed prototypes for some of the devices. The full complement of wearable sensors would help a sightless person navigate by conveying information about his or her surroundings.</p><p>The researchers hope their findings on perception, and the prototypes they develop, will spawn a raft of wearable electronic devices to help blind people "see" their environment at a distance through touch, hearing and other senses. The technology would also benefit sighted individuals who must navigate in poor visibility, such as firefighters and pilots.</p><p>Principal investigator Zhigang Zhu, professor of computer science and computer engineering in City College's Grove School of Engineering, will collaborate with City College professor of psychology and director of the Program in Cognitive Neuroscience Tony Ro, City College professor of electrical engineering Ying Li Tian, Georgia Tech Woodruff School of Mechanical Engineering professor Kok-Meng Lee, and Georgia Tech School of Applied Physiology associate professor Boris Prilutsky.</p><p>The third project will address a fundamental question of developmental biology: what controls the spatial and temporal patterns of cell differentiation? Answering this question will lead to a better understanding of the basic principles of embryogenesis, explain origins of developmental disorders, and provide guidelines for tissue engineering and regenerative medicine.</p><p>The research will be conducted by principal investigator and Princeton University Department of Chemical and Biological Engineering associate professor Stanislav Shvartsman, Georgia Tech School of Chemical and Biomolecular Engineering associate professor Hang Lu, New York University Department of Biology professor Christine Rushlow, and University of Illinois at Urbana Champaign Department of Computer Science associate professor Saurabh Sinha.</p><p>Scientists know that among an embryo's first major developments is the establishment of its dorsoventral axis, which runs from its back to its belly. The researchers plan to study how this axis development unfolds -- specifically the presence and location of proteins during the process, which give rise to muscle, nerve and skin tissues.</p><p>To enable large-scale quantitative analyses of protein positional information along the dorsoventral axis, Lu and Shvartsman will further develop a microfluidic device they previously designed to reliably and robustly orient several hundred embryos in just a few minutes.</p><p>"By understanding this system at a deeper, quantitative level, we will elucidate general principles underlying the operation of genetic and multicellular networks that drive development," said Lu.</p><p><strong>Research News &amp; Publications Office<br /> Georgia Institute of Technology<br /> 75 Fifth Street, N.W., Suite 314<br /> Atlanta, Georgia 30308 USA</strong></p><p><strong>Media Relations Contacts:</strong> Abby Robinson (abby@innovate.gatech.edu; 404-385-3364) or John Toon (jtoon@gatech.edu; 404-894-6986)</p><p><strong>Writers:</strong> Abby Robinson, Holly Korschun and Jessa Forte Netting</p><p>&nbsp;</p>]]></body>  <author>Abby Vogel Robinson</author>  <status>1</status>  <created>1317254400</created>  <gmt_created>2011-09-29 00:00:00</gmt_created>  <changed>1475896214</changed>  <gmt_changed>2016-10-08 03:10:14</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Three $2 million awards from NSF involve Georgia Tech researchers.]]></teaser>  <type>news</type>  <sentence><![CDATA[Three $2 million awards from NSF involve Georgia Tech researchers.]]></sentence>  <summary><![CDATA[<p>The National Science Foundation has awarded $6 million through its Division of Emerging Frontiers in Research and Innovation to fund three projects involving researchers from the Georgia Institute of Technology.</p>]]></summary>  <dateline>2011-09-29T00:00:00-04:00</dateline>  <iso_dateline>2011-09-29T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-09-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[abby@innovate.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Abby Robinson</strong><br />Research News and Publications<br /><a href="http://www.gatech.edu/contact/index.html?id=avogel6">Contact Abby Robinson</a><br /><strong>404-385-3364</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>70404</item>          <item>70405</item>      </media>  <hg_media>          <item>          <nid>70404</nid>          <type>image</type>          <title><![CDATA[Ting-Kemp-Hackney-Liu]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177314</created>          <gmt_created>2015-12-03 21:15:14</gmt_created>          <changed>1475894618</changed>          <gmt_changed>2016-10-08 02:43:38</gmt_changed>      </item>          <item>          <nid>70405</nid>          <type>image</type>          <title><![CDATA[microfluidic device]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177314</created>          <gmt_created>2015-12-03 21:15:14</gmt_created>          <changed>1475894618</changed>          <gmt_changed>2016-10-08 02:43:38</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.bme.gatech.edu/facultystaff/faculty_record.php?id=37]]></url>        <title><![CDATA[Lena Ting]]></title>      </link>          <link>        <url><![CDATA[http://www.chbe.gatech.edu/faculty/lu.php]]></url>        <title><![CDATA[Hang Lu]]></title>      </link>          <link>        <url><![CDATA[http://www.me.gatech.edu/faculty/lee.shtml]]></url>        <title><![CDATA[Kok-Meng Lee]]></title>      </link>          <link>        <url><![CDATA[http://www.ap.gatech.edu/Prilutsky/]]></url>        <title><![CDATA[Boris Prilutsky]]></title>      </link>          <link>        <url><![CDATA[http://www.bme.gatech.edu/facultystaff/faculty_record.php?id=104]]></url>        <title><![CDATA[Charlie Kemp]]></title>      </link>          <link>        <url><![CDATA[http://www.ic.gatech.edu/people/karen-liu]]></url>        <title><![CDATA[Karen Liu]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="1102"><![CDATA[blind]]></keyword>          <keyword tid="14478"><![CDATA[Boris Prilutsky]]></keyword>          <keyword tid="14480"><![CDATA[cell differentiation]]></keyword>          <keyword tid="2157"><![CDATA[Charlie Kemp]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="594"><![CDATA[college of engineering]]></keyword>          <keyword tid="11533"><![CDATA[Department of Biomedical Engineering]]></keyword>          <keyword tid="898"><![CDATA[Hang Lu]]></keyword>          <keyword tid="2296"><![CDATA[Karen Liu]]></keyword>          <keyword tid="14477"><![CDATA[Kok-Meng Lee]]></keyword>          <keyword tid="2266"><![CDATA[Lena Ting]]></keyword>          <keyword tid="7341"><![CDATA[microfluidic]]></keyword>          <keyword tid="1482"><![CDATA[mobility]]></keyword>          <keyword tid="1356"><![CDATA[robot]]></keyword>          <keyword tid="167863"><![CDATA[School of Applied Physiology]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="69297">  <title><![CDATA[Study Shows How the Internet's Architecture Got its Hourglass Shape]]></title>  <uid>27303</uid>  <body><![CDATA[<p>In the natural world, species that share the same ecosystem often compete for resources, resulting in the extinction of weaker competitors. A new computer model that describes the evolution of the Internet's architecture suggests something similar has happened among the layers of protocols that have survived -- and become extinct -- on the worldwide network.</p><p>Understanding this evolutionary process may help computer scientists as they develop protocols to help the Internet accommodate new uses and protect it from a wide range of threats. But the model suggests that unless the new Internet avoids such competition, it will evolve an hourglass shape much like today's Internet.</p><p>"To avoid the ossification effects we experience today in the network and transport layers of the Internet, architects of the future Internet need to increase the number of protocols in these middle layers, rather than just push these one- or two-protocol layers to a higher level in the architecture," said Constantine Dovrolis, an associate professor in the School of Computer Science at the Georgia Institute of Technology. </p><p>The research will be presented on Aug. 17, 2011 at SIGCOMM, the annual conference of the Special Interest Group on Data Communication, a special interest group of the Association for Computing Machinery. This research was supported by the National Science Foundation.</p><p>From top to bottom, the Internet architecture consists of six layers: </p><p>• Specific applications, such as Firefox;<br />• Application protocols, such as Hypertext Transfer Protocol (HTTP);<br />• Transport protocols, such as Transmission Control Protocol (TCP);<br />• Network protocols, such as Internet Protocol (IP);<br />• Data-link protocols, such as Ethernet; and<br />• Physical layer protocols, such as DSL.</p><p>Layers near the top and bottom contain many items, called protocols, while the middle layers do not. The central transport layer contains two protocols and the network layer contains only one, creating an hourglass architecture.</p><p>Dovrolis and graduate student Saamer Akhshabi created an evolutionary model called EvoArch to study the emergence of the Internet's hourglass structure. In the model, the architecture of the network changed with time as new protocols were created at different layers and existing protocols were removed as a result of competition with other protocols in the same layer.</p><p>EvoArch showed that even if future Internet architectures are not built in the shape of an hourglass initially, they will probably acquire that shape as they evolve. Through their simulations, Dovrolis and Akhshabi found that while the accuracy of the structure improved with time, the basic hourglass shape was always formed -- no matter what shape it started in.</p><p>"Even though EvoArch does not capture many practical aspects and protocol-specific or layer-specific details of the Internet architecture, the few parameters it is based on -- the generality of protocols at different layers, the competition between protocols at the same layer, and how new protocols are created -- reproduced the observed hourglass structure and provided for a robust model," said Dovrolis.</p><p>The model revealed a plausible explanation for the Internet's hourglass shape. At the top, protocols are so specialized and selective in what underlying building blocks they use that they rarely compete with each other. When there is very little competition, the probability of extinction for a protocol is close to zero. </p><p>"In the top layers of the Internet, many new applications and application-specific protocols are created over time, but few things die, causing the top of the hourglass to get wider over time," said Dovrolis.</p><p>In the higher layers, a new protocol can compete and replace an incumbent only if they provide very similar services. For example, services provided by the File Transfer Protocol (FTP) and HTTP overlapped in the application-specific layer. When HTTP became more valuable because of its own higher layer products -- applications such as web browsers -- FTP became extinct.</p><p>At the bottom, each protocol serves as a general building block and shares many products in the layer above. For example, the Ethernet protocol in the data-link layer uses the coaxial cable, twisted pair and optical fiber technologies in the physical layer. But because the bottom layer protocols are used in an abundant way, none of them dominate, leading to a low probability of extinction at layers close to the bottom. </p><p>The EvoArch model predicts the emergence of few powerful and old protocols in the middle layers, referred to as evolutionary kernels. The evolutionary kernels of the Internet architecture include IPv4 in the network layer, and TCP and the User Datagram Protocol (UDP) in the transport layer. These protocols provide a stable framework through which an always-expanding set of physical and data-link layer protocols, as well as new applications and services at the higher layers, can interoperate and grow. At the same time, however, those three kernel protocols have been difficult to replace, or even modify significantly.</p><p>To ensure more diversity in the middle layers, EvoArch suggests designing protocols that are largely non-overlapping in terms of services and functionality so that they do not compete with each other. The model suggests that protocols overlapping more than 70 percent of their functions start competing with each other.</p><p>When the researchers extended the EvoArch model to include a protocol quality factor -- which can capture protocol performance, extent of deployment, reliability or security -- the network grew at a slower pace, but continued to exhibit an hourglass shape. In contrast to the basic model, the quality factor affected the competition in the bottom layers and only high-quality protocols survived there. The model also showed that the kernel protocols in the waist of the hourglass were not necessarily the highest-quality protocols. </p><p>"It is not true that the best protocols always win the competition," noted Dovrolis. "Often, the kernels of the architecture are lower-quality protocols that were created early and with just the right set of connections."</p><p>Researchers are also using the EvoArch model to explore the emergence of hourglass architectures in other areas, such as metabolic and gene regulatory networks, the organization of the innate immune system, and in gene expression during development. </p><p>"I believe there are similarities between the evolution of Internet protocol stacks and the evolution of some biological, technological and social systems, and we are currently using EvoArch to explore these other hourglass structures," said Dovrolis.</p><p><em>This project is supported by the National Science Foundation (NSF) (Award No. 0831848). The content is solely the responsibility of the principal investigator and does not necessarily represent the official views of the NSF.</em></p><p><strong>Research News &amp; Publications Office<br />Georgia Institute of Technology<br />75 Fifth Street, N.W., Suite 314<br />Atlanta, Georgia  30308  USA</strong></p><p><strong></strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Abby Robinson (404-385-3364)(<a href="mailto:abby@innovate.gatech.edu">abby@innovate.gatech.edu</a>).</p><p><strong>Writer</strong>: Abby Robinson</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1313193600</created>  <gmt_created>2011-08-13 00:00:00</gmt_created>  <changed>1475896195</changed>  <gmt_changed>2016-10-08 03:09:55</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new model describes how the Internet's architecture evolved.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new model describes how the Internet's architecture evolved.]]></sentence>  <summary><![CDATA[<p>A new computer model that describes the evolution of the Internet's architecture suggests a process similar to natural evolution took place to determine which protocols survived and which ones became extinct.</p>]]></summary>  <dateline>2011-08-13T00:00:00-04:00</dateline>  <iso_dateline>2011-08-13T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-08-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>John Toon</strong><br />Research News &amp; Publications Office<br /><a href="http://www.gatech.edu/contact/index.html?id=jt7">Contact John Toon</a><br /><strong>404-894-6986</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>69298</item>          <item>69299</item>      </media>  <hg_media>          <item>          <nid>69298</nid>          <type>image</type>          <title><![CDATA[Protocol stack]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177252</created>          <gmt_created>2015-12-03 21:14:12</gmt_created>          <changed>1475894606</changed>          <gmt_changed>2016-10-08 02:43:26</gmt_changed>      </item>          <item>          <nid>69299</nid>          <type>image</type>          <title><![CDATA[EvoArch Plot]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177252</created>          <gmt_created>2015-12-03 21:14:12</gmt_created>          <changed>1475894606</changed>          <gmt_changed>2016-10-08 02:43:26</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.scs.gatech.edu/]]></url>        <title><![CDATA[Georgia Tech School of Computer Science]]></title>      </link>          <link>        <url><![CDATA[http://www.scs.gatech.edu/people/constantine-dovrolis]]></url>        <title><![CDATA[Constantine Dovrolis]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="439"><![CDATA[computer]]></keyword>          <keyword tid="13398"><![CDATA[Constantine Dovrolis]]></keyword>          <keyword tid="13994"><![CDATA[Internet architecture]]></keyword>          <keyword tid="1385"><![CDATA[network]]></keyword>          <keyword tid="13995"><![CDATA[protocol]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="69126">  <title><![CDATA[Company Uses Georgia Tech Innovation to Improve Transaction Security]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The quality of signals transmitted from devices such as smart phones can degrade dramatically with distance.  Whisper Communications is taking advantage of that basic law of physics to provide more secure wireless communication, including protection for financial transactions that use the "digital wallet" technology now under development.</p><p>Based on patent-pending technology from the Georgia Institute of Technology, the Atlanta company has developed an encoding methodology that makes data signals transmitted beyond its "cone of silence" useless to any eavesdroppers.  Whisper is now working with First Data, a major payment processing provider, to demonstrate this layer of security using two of the newest Android phones.</p><p>"Our product will give consumers a higher degree of confidence that their private information is being protected during transactions, without them having to do anything," said Steven McLaughlin, co-developer of the technology and a Ken Byers Professor in Georgia Tech's School of Electrical and Computer Engineering.  </p><p>Digital wallet technology will enable consumers to use their smart phones and other devices to make financial transactions, replacing traditional plastic credit cards.  But without strong security, transferring data from the phones to merchant terminals could expose it to theft from "sniffer" devices that can capture wireless information.</p><p>Whisper's software would be installed on mobile devices carrying the digital wallet technology, said Jeffrey McConnell, CEO of the company.  It would automatically encode the users' credit card information, which would then be decoded by similar software on the merchant side of the transaction.  Because of the company's proprietary coding, the information would only be readable within two or three feet of the merchant terminal -- and hopelessly garbled beyond that distance.</p><p>"Once you get outside of that cone of silence, communications is no longer possible," McConnell explained.  "An eavesdropper hoping to get confidential information would get nothing.  This allows us to set a defined zone within which secure communication can occur.  Once you get beyond that boundary, no usable information can get out."</p><p>The company believes that mobile financial transactions are the most compelling first application for the product, but the technology could be used wherever data traveling wirelessly needs to be protected.  Other uses might be in medical devices that transmit wirelessly, in the electronic check-in pads being developed to gather patient information in medical offices, and in streaming video played via wireless devices, McConnell said.</p><p>"Our technology is an encoding methodology, so the methodology is the same with any application, whether it's for mobile payments or high-speed video," said McConnell, who has a background with payment processing companies including American Express, First Data and Western Union.  </p><p>Whisper Communications has so far received seed funding from the Georgia Research Alliance (GRA) VentureLab program, Atlanta-based Imlay Investments and the Georgia Tech Edison Fund.  It has also received a Phase I Small Business Innovation Research (SBIR) grant from the National Science Foundation (NSF).</p><p>The company has been working with First Data to evaluate the new product.  A full demonstration is planned for this summer, and McConnell said the software could be ready for the marketplace within six months.  </p><p>The company expects to license its product to the developers of digital wallets, and to the makers of merchant terminals. Worldwide, there are about 20 million terminals in operation, and most of them would be candidates for the Whisper software.  In the United States alone, there are 150 million smart phones.</p><p>With its strong roots in financial services and information security, Atlanta is a good place to build a company like Whisper, McLaughlin noted.  </p><p>"Atlanta is an ideal city for the mobile payments and security approach that Whisper is taking," he said.  "It has always been known as a go-to place for cyber-security and has the largest concentration of credit card payment companies in the United States, so the combination of security and payments is a natural." </p><p>Whisper's original technology was developed by McLaughlin and Georgia Tech alumni Cenk Argon and Demijan Klinc.  It has roots going back to "quantum key distribution" research done at Georgia Tech's Lorraine campus with collaborators from Portugal.  </p><p>McLaughlin, who is also Georgia Tech's Vice Provost for International Initiatives, realized that technology developed for the earlier project could have applications in securing wireless communications.  But he didn't have a startup company in mind until he was approached by staff from the Georgia Tech VentureLab program.  The VentureLab team, which included Paul Freet, Keith McGreggor and Stephen Fleming, learned of the technology and approached McLaughlin about forming a company.</p><p>"VentureLab has been nothing less than fantastic for us," said McLaughlin.  "From the very beginning, we felt high interest, support and a push to succeed."</p><p>VentureLab introduced McLaughlin to McConnell, and was instrumental in obtaining funding to support early commercialization studies.  </p><p>"We have created a good product, none of which would have been there without what VentureLab did," said McConnell.  "They helped the researchers and pushed them to explore how this technology could be turned into a viable company."</p><p>VentureLab is Georgia Tech's comprehensive center for technology commercialization, open to all faculty, research staff and students who want to form startup companies based upon their research. Part of Georgia Tech's Enterprise Innovation Institute, VentureLab transforms innovations into companies by developing engaging business models, connecting researchers with experienced entrepreneurs, locating sources of early-stage financing and preparing these new companies for global markets.</p><p>Companies created within VentureLab become part of the Advanced Technology Development Center (ATDC), Georgia Tech's startup accelerator.  ATDC has been helping to launch and build successful technology companies for more than 30 years.</p><p><strong>Research News &amp; Publications Office<br />Georgia Institute of Technology<br />75 Fifth Street, N.W., Suite 314<br />Atlanta, Georgia  30308  USA</strong></p><p><strong></strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Abby Robinson (404-385-2264)(<a href="mailto:abby@innovate.gatech.edu">abby@innovate.gatech.edu</a>).</p><p><strong>Writer</strong>: John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1312243200</created>  <gmt_created>2011-08-02 00:00:00</gmt_created>  <changed>1475896192</changed>  <gmt_changed>2016-10-08 03:09:52</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Whisper Communications provides security for financial transactions.]]></teaser>  <type>news</type>  <sentence><![CDATA[Whisper Communications provides security for financial transactions.]]></sentence>  <summary><![CDATA[<p>An Atlanta-based company is taking advantage of the basic laws of physics -- and a Georgia Tech innovation -- to provide protection for financial transactions that use the "digital wallet" technology now under development.</p>]]></summary>  <dateline>2011-08-02T00:00:00-04:00</dateline>  <iso_dateline>2011-08-02T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-08-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>John Toon</strong><br />Research News &amp; Publications Office<br /><a href="http://www.gatech.edu/contact/index.html?id=jt7">Contact John Toon</a><br /><strong>404-894-6986</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>69127</item>      </media>  <hg_media>          <item>          <nid>69127</nid>          <type>image</type>          <title><![CDATA[Whisper Communications]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177239</created>          <gmt_created>2015-12-03 21:13:59</gmt_created>          <changed>1475894604</changed>          <gmt_changed>2016-10-08 02:43:24</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.venturelab.gatech.edu/]]></url>        <title><![CDATA[Georgia Tech VentureLab]]></title>      </link>          <link>        <url><![CDATA[http://www.atdc.org/]]></url>        <title><![CDATA[ATDC]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="4238"><![CDATA[atdc]]></keyword>          <keyword tid="9651"><![CDATA[cyber-security]]></keyword>          <keyword tid="13857"><![CDATA[digital wallet]]></keyword>          <keyword tid="13858"><![CDATA[financial transactions]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>          <keyword tid="4193"><![CDATA[venturelab]]></keyword>          <keyword tid="13856"><![CDATA[Whisper Communications]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="68594">  <title><![CDATA[LiquidText Software Supports Active Reading with Fingertip Gestures]]></title>  <uid>27206</uid>  <body><![CDATA[<p>Many reading tasks require individuals to not only read a document, but also to understand, learn from and retain the information in it. For this type of reading, experts recommend a process called active reading, which involves highlighting, outlining and taking notes on the text.</p><p>Researchers at the Georgia Institute of Technology have developed software that facilitates an innovative approach to active reading. Taking advantage of touch-screen tablet computers, the LiquidText software enables active readers to interact with documents using finger motions. LiquidText can significantly enhance the experiences of active readers, a group that includes students, lawyers, managers, corporate strategists and researchers.</p><p>"Most computer-based active reading software seeks to replicate the experience of paper, but paper has limitations, being in many ways inflexible," said Georgia Tech graduate student Craig Tashman. "LiquidText offers readers a fluid-like representation of text so that users can restructure, revisualize and rearrange content to suit their needs."</p><p>LiquidText was developed by Tashman and Keith Edwards, an associate professor in the Georgia Tech School of Interactive Computing. The software can run on any Windows 7 touchscreen computer.</p><p>Details on LiquidText were presented in May 2011 at the Association for Computing Machinery's annual Conference on Human Factors in Computing Systems (CHI) in Vancouver, Canada. Development of LiquidText was supported by the National Science Foundation, Steelcase, Samsung and Dell.</p><p>Active reading demands more of the reading medium than simply advancing pages, Edwards noted. Active readers may need to create and find a variety of highlights and comments, and move rapidly among multiple sections of a document.</p><p>"With paper, it can be difficult to view disconnected parts of a document in parallel, annotation can be constraining, and its linear nature gives readers little flexibility for creating their own navigational structures," said Edwards.</p><ul><li><em><a href="http://liquidtext.net/demos/">Watch videos describing how LiquidText works.</a></em></li></ul><p>LiquidText provides flexible control of the visual arrangement of content, including both original text and annotations. To do this, the software uses a number of common fingertip gestures on the touchscreen and introduces several novel gestures. For example, to view two areas of a document at once, the user can pinch an area of text and collapse it.</p><p>Active reading involves annotation, content extraction and fast, fluid navigation among multiple portions of a document. To accomplish these tasks, LiquidText integrates a traditional document reading space with a dedicated workspace area where the user can organize excerpts and annotations of a text -- without losing the links back to their sources. In these spaces, the user can perform many actions, including:</p><ul><li>Highlight text</li><li>Comment about text</li><li>Extract text</li><li>Collapse text</li><li>Bookmark text</li><li>Magnify text</li></ul><p>For commenting, LiquidText breaks away from the traditional one-to-one mapping between content and comments. Comment objects can refer to any number of pieces of content across a document, or even multiple documents. Comments can be pulled off, rearranged and grouped with other items while maintaining a persistent link back to the content they refer to. To add a comment, users simply select the desired text and begin typing.</p><p>Content can also be copied and extracted using LiquidText. Once a section of text has been selected, the user creates an excerpt simply by dragging the selection into the workspace until it "snaps off" of the document. The original content remains in the document, although it is tinted slightly to indicate that an excerpt has been made from it. Excerpts can be freely laid out in the workspace area or be attached to one another or to documents to form groups, while each excerpt can also be traced back to its source.</p><p>"The problem with paper and some software programs is that the comments must generally fit in the space of a small margin and can only be linked to a single page of text at a time," said Tashman. "LiquidText's more flexible notion of comments and large workspace area provide space for organizing and manipulating any comments or document excerpts the user may have created."</p><p>In addition to traditional zooming and panning, the user can create a magnifying glass in the workspace by tapping with three fingers. The magnifying glass zooms in on select areas while allowing the user to maintain an awareness of the workspace as a whole. Users can manipulate the magnifying glass with simple multi-touch gestures, such as pinching or stretching to resize the lens, or rotating to change the zoom level -- like the zoom lens of a camera. Users can position, resize and control the zoom level of the magnifying glasses in a continuous motion by movements of the hand alone.</p><p>The ability to move within a document, search for text, turn a page, or flip between locations to compare parts of a text is also important for active reading. To complete these actions, LiquidText allows users to collapse text, dog-ear text and create magnified views of text.</p><p>"In contrast to traditional document viewing software, in which users must create separate panes and scroll them individually, LiquidText's functionality lets a user view two or more document areas with just one action, parallelizing an otherwise serial task," explained Edwards.</p><p>Since developing their initial prototype, the researchers have refined the software based on feedback from designers and human factors professionals, and active readers that included managers, lawyers, students and strategists.</p><p>Tashman is currently working with Georgia Tech's Enterprise Innovation Institute to form a startup company to commercialize the technology. The $15,000 Georgia Tech Edison Prize he won, along with $43,000 in grants from the Georgia Research Alliance, will help launch the new company that plans to introduce LiquidText to the public later this year.</p><p>The Georgia Tech Edison Prize was established to encourage formation of startup companies based on technology developed at Georgia Tech, and was made possible by a multi-year grant from the Charles A. Edison Fund, named for the inventor's son. Presentation of the prize, the second to be awarded from the Fund, was part of the Georgia Tech Graduate Research and Innovation Conference held Feb. 8, 2011.</p><p><em>This project is supported in part by the National Science Foundation (Award No. IIS-0705569). The content is solely the responsibility of the principal investigator and does not necessarily represent the official views of the NSF.</em></p><p><strong>Research News &amp; Publications Office<br /> Georgia Institute of Technology<br /> 75 Fifth Street, N.W., Suite 314<br /> Atlanta, Georgia 30308 USA</strong></p><p><strong>Media Relations Contacts:</strong> Abby Robinson (abby@innovate.gatech.edu; 404-385-3364) or John Toon (jtoon@gatech.edu; 404-894-6986)</p><p><strong>Writer:</strong> Abby Robinson</p>]]></body>  <author>Abby Vogel Robinson</author>  <status>1</status>  <created>1309219200</created>  <gmt_created>2011-06-28 00:00:00</gmt_created>  <changed>1475896180</changed>  <gmt_changed>2016-10-08 03:09:40</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[LiquidText software takes an innovative approach to active reading.]]></teaser>  <type>news</type>  <sentence><![CDATA[LiquidText software takes an innovative approach to active reading.]]></sentence>  <summary><![CDATA[<p>Georgia Tech College of Computing researchers have developed innovative software for active reading, an activity that involves highlighting, outlining and taking notes on a document.</p>]]></summary>  <dateline>2011-06-28T00:00:00-04:00</dateline>  <iso_dateline>2011-06-28T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-06-28 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[abby@innovate.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>Abby Robinson</strong><br />Research News and Publications<br /><a href="http://www.gatech.edu/contact/index.html?id=avogel6">Contact Abby Robinson</a><br /><strong>404-385-3364</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>68595</item>          <item>68596</item>          <item>68597</item>      </media>  <hg_media>          <item>          <nid>68595</nid>          <type>image</type>          <title><![CDATA[Craig Tashman and Keith Edwards]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177185</created>          <gmt_created>2015-12-03 21:13:05</gmt_created>          <changed>1475894594</changed>          <gmt_changed>2016-10-08 02:43:14</gmt_changed>      </item>          <item>          <nid>68596</nid>          <type>image</type>          <title><![CDATA[LiquidText software]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177185</created>          <gmt_created>2015-12-03 21:13:05</gmt_created>          <changed>1475894594</changed>          <gmt_changed>2016-10-08 02:43:14</gmt_changed>      </item>          <item>          <nid>68597</nid>          <type>image</type>          <title><![CDATA[LiquidText screen]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177185</created>          <gmt_created>2015-12-03 21:13:05</gmt_created>          <changed>1475894594</changed>          <gmt_changed>2016-10-08 02:43:14</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://liquidtext.net/]]></url>        <title><![CDATA[LiquidText]]></title>      </link>          <link>        <url><![CDATA[http://www.cc.gatech.edu/people/keith-edwards]]></url>        <title><![CDATA[Keith Edwards]]></title>      </link>          <link>        <url><![CDATA[http://www.cc.gatech.edu/]]></url>        <title><![CDATA[College of Computing]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="13544"><![CDATA[active reading]]></keyword>          <keyword tid="13545"><![CDATA[annotation]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="13547"><![CDATA[Comment]]></keyword>          <keyword tid="13552"><![CDATA[corporate strategist]]></keyword>          <keyword tid="13542"><![CDATA[Craig Tashman]]></keyword>          <keyword tid="13548"><![CDATA[fingertip gesture]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="68478">  <title><![CDATA[Application for iPhone May Help Monitor Parkinson's Disease]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Researchers at the Georgia Tech Research Institute (GTRI) have developed a novel iPhone application that may enable persons with Parkinson's disease and certain other neurological conditions to use the ubiquitous devices to collect data on hand and arm tremors and relay the results to medical personnel.   </p><p>The researchers believe the application could replace subjective tests now used to assess the severity of tremors, while potentially allowing more frequent patient monitoring without costly visits to medical facilities. </p><p>The program -- known as iTrem -- could be offered later this year by the App Store, an Apple Inc. website that sells iPhone applications.  But iTrem will first undergo a clinical study at Emory University and must receive any required approvals from the Food and Drug Administration. </p><p>"We expect iTrem to be a very useful tool for patients and their caregivers," said Brian Parise, a research scientist who is principal investigator for the project along with Robert Delano, another GTRI research scientist. "And as a downloadable application, it also promises to be convenient and cost-effective." </p><p>iTrem utilizes the iPhone's built-in accelerometer to collect data on a patient in his or her home or office. The application directly tracks tremor information currently, and in the future will use simple puzzle games to record tremor data, which will then be processed and transmitted.  </p><p>The researchers expect the clinical trial to show that data gathered by the program would allow physicians to remotely monitor the degree of disability, progression and medication response among patients with tremor-related conditions. In addition, iTrem offers a social component that allows people to share stories, pictures and data. </p><p>iTrem's developers are working with the Advanced Technology Development Center (ATDC) to form a startup company based on iTrem and future applications that might take advantage of iPhone capabilities.  ATDC is a startup accelerator based at Georgia Tech that helps Georgia entrepreneurs launch and build successful technology companies.</p><p>The GTRI team plans ongoing development of iTrem's interface, based on responses from doctors and patients.  They're also investigating other consumer technologies with diagnostic potential, including the tiny gyroscopes now available in some cellular phones.</p><p>Future developments will include the addition of several other Parkinson's related tests and investigation of gait analysis in a joint effort with the University of South Florida and the James A. Haley Veterans' Hospital in Tampa, Fla.  Additional developments may utilize the phone for detecting and analyzing dyskinesia, a movement disorder.</p><p>More than 10 million people in the U.S. have tremor-related disease, including Parkinson's, essential tremor and multiple sclerosis, Delano said.  Data collected by iTrem could enhance research on tremor disorders, in addition to supporting treatment for current patients, he added.</p><p>Most current measurement techniques used by doctors are subjective and are performed infrequently, Delano said.  Complex diagnostic procedures such as electroencephalography and electromyography are objective and thorough, but are rarely performed because they're lengthy, expensive and require a clinical setting. The result is that little data about tremor has been available to track the effectiveness of medication and therapy over time.  </p><p>By contrast, he said, the ease of gathering tremor data with iTrem could help lead to a significant expansion of research in this area, as a wealth of objective data is collected and analyzed. </p><p>"Even factoring in the cost of an iPhone, using iTrem is likely to be more convenient and less expensive for patients than office visits, and the data are accurate and abundant," Delano said. </p><p>A clinical study involving iTrem use is expected to start soon at Emory University's Movement Disorder Clinic. The study will be led by Dr. Stewart Factor, a researcher in the field of Parkinson's disease at the Emory School of Medicine. </p><p>The GTRI development team presented a paper on iTrem in January at the 2011 International Conference on Health Informatics.  </p><p>Delano explained that the development of iTrem was linked to his own diagnosis with Parkinson's disease several years ago. He eventually became frustrated with the subjective approaches commonplace in the characterizing of patient tremor symptoms.</p><p>"Currently, doctors observe tremor during office visits and rate it on a subjective scale of zero to four.  That approach seemed outdated to me, considering all the technology now available," Delano said. "My wife Heather, who's an engineer, remarked that maybe that we could try putting some accelerometers on my arm.  That made me think of the accelerometer in the iPhone -- and here we are."  </p><p><strong>Research News &amp; Publications Office<br />Georgia Institute of Technology<br />75 Fifth Street, N.W., Suite 314<br />Atlanta, Georgia  30308  USA</strong></p><p><strong></strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Kirk Englehardt (404-407-7280)(<a href="mailto:kirk.englehardt@gtri.gatech.edu">kirk.englehardt@gtri.gatech.edu</a>).</p><p><strong>Writer</strong>: Rick Robinson</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1308700800</created>  <gmt_created>2011-06-22 00:00:00</gmt_created>  <changed>1475896177</changed>  <gmt_changed>2016-10-08 03:09:37</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new iPhone app may improve monitoring of Parkinson's Disease]]></teaser>  <type>news</type>  <sentence><![CDATA[A new iPhone app may improve monitoring of Parkinson's Disease]]></sentence>  <summary><![CDATA[<p>Researchers have developed a novel iPhone application that may enable persons with Parkinson’s disease and certain other neurological conditions to use the devices to collect data on hand and arm tremors and relay the results to medical personnel.</p>]]></summary>  <dateline>2011-06-22T00:00:00-04:00</dateline>  <iso_dateline>2011-06-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-06-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>John Toon</strong><br />Research News &amp; Publications Office<br /><a href="http://www.gatech.edu/contact/index.html?id=jt7">Contact John Toon</a><br /><strong>404-894-6986</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>68479</item>          <item>68480</item>      </media>  <hg_media>          <item>          <nid>68479</nid>          <type>image</type>          <title><![CDATA[Brian Parise and Robert Delano with iTrem]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177176</created>          <gmt_created>2015-12-03 21:12:56</gmt_created>          <changed>1475894594</changed>          <gmt_changed>2016-10-08 02:43:14</gmt_changed>      </item>          <item>          <nid>68480</nid>          <type>image</type>          <title><![CDATA[Brian Parise and Robert Delano with iTrem]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449177176</created>          <gmt_created>2015-12-03 21:12:56</gmt_created>          <changed>1475894594</changed>          <gmt_changed>2016-10-08 02:43:14</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.gtri.gatech.edu/]]></url>        <title><![CDATA[Georgia Tech Research Institute]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="13472"><![CDATA[Brian Parise]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="13470"><![CDATA[iTrem]]></keyword>          <keyword tid="13471"><![CDATA[Parkinson&#039;s]]></keyword>          <keyword tid="13473"><![CDATA[Robert Delano]]></keyword>          <keyword tid="13474"><![CDATA[tremors]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="66210">  <title><![CDATA[Georgia Tech Research Institute Leads $10 M Open Source Initiative]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The U.S. Department of Homeland Security (DHS) Science and Technology (S&amp;T) Directorate has named the Georgia Tech Research Institute (GTRI) to lead implementation efforts for the five-year, $10 million Homeland Open Security Technology (HOST) program.  The HOST program will investigate open source and open cyber security methods, models and technologies, and identify viable and sustainable approaches that support national cyber security objectives.</p><p>"The strategic objective of the HOST program is to lead efforts of discovery and collaboration, seeding development in open source software and practices that produce a measurable impact for government cyber security systems," said Joshua Davis, associate division head at GTRI's Cyber Technology and Information Security Laboratory and principal investigator for the HOST program.  "The collaborative nature of open source and open technologies provide unique technical and economic value and opportunities for government users." </p><p>Open technologies are not a panacea for all challenges, Davis added.  HOST will reach out to government, industry, academic and open source community representatives to learn where and how open technologies have been successfully adopted within public and private systems and where the challenges still remain.  </p><p>"As we go, we are sharing this information across government agencies and helping to build networks of users, service and support providers and policy influencers, and providing a venue to enable them to discuss, share and learn from collective experiences," Davis said.  "The collective is what gives open source its strength.  We are simply applying this successful strategy to address government cyber security challenges."</p><p>GTRI is leading HOST efforts in conjunction with the Open Technology Research Consortium (OTRC), a collaborative network of leading academic research institutions, industry partners and open source community organizations that work to promote the advancement of open source software adoption within government agencies. OTRC members participating in the HOST program include: Georgia Tech Research Institute, University of Texas at Austin, the Open Information Security Foundation and the Open Source Software Institute.</p><p>Securing the nation's cyber networks and protecting critical infrastructures is a primary focus of the Department of Homeland Security.  To accomplish this, DHS seeks to drive innovation and promote the adoption of cyber security technologies, techniques and procedures that produce safe, secure and resilient cyber systems for federal, state, local, tribal and territorial government agencies.  </p><p>Within DHS, the Science and Technology Directorate is responsible for sponsoring advanced research activities and leading the development of collaborative working relationships to exchange ideas and technical resources between the public and private-sector environments. </p><p>Additional information on the HOST program will be made available through the DHS HOST website (<a href="http://www.cyber.st.dhs.gov/host.html" title="www.cyber.st.dhs.gov/host.html">www.cyber.st.dhs.gov/host.html</a>) and through a publicly accessible informational portal to be launched this summer. </p><p><strong>Research News &amp; Publications Office<br />Georgia Institute of Technology<br />75 Fifth Street, N.W., Suite 314<br />Atlanta, GA  30308 USA</strong></p><p><strong></strong></p><p><strong>Media Relations Contacts</strong>: Kirk Englehardt (404-407-7280)(<a href="mailto:kirk.englehardt@gtri.gatech.edu">kirk.englehardt@gtri.gatech.edu</a>) or John Toon (404-894-6986)(<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>).</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1305590400</created>  <gmt_created>2011-05-17 00:00:00</gmt_created>  <changed>1475896125</changed>  <gmt_changed>2016-10-08 03:08:45</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[GTRI researchers are leading a new open source software initiative.]]></teaser>  <type>news</type>  <sentence><![CDATA[GTRI researchers are leading a new open source software initiative.]]></sentence>  <summary><![CDATA[<p>The U.S. Department of Homeland Security (DHS) Science and Technology (S&amp;T) Directorate has named the Georgia Tech Research Institute (GTRI) to lead implementation efforts for the five-year, $10 million Homeland Open Security Technology (HOST) program.</p>]]></summary>  <dateline>2011-05-17T00:00:00-04:00</dateline>  <iso_dateline>2011-05-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2011-05-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><strong>John Toon</strong><br />Research News &amp; Publications Office<br /><a href="http://www.gatech.edu/contact/index.html?id=jt7">Contact John Toon</a><br /><strong>404-894-6986</strong></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>66211</item>      </media>  <hg_media>          <item>          <nid>66211</nid>          <type>image</type>          <title><![CDATA[Joshua Davis]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449176931</created>          <gmt_created>2015-12-03 21:08:51</gmt_created>          <changed>1475894589</changed>          <gmt_changed>2016-10-08 02:43:09</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.gtri.gatech.edu/]]></url>        <title><![CDATA[Georgia Tech Research Institute]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="13168"><![CDATA[Department of Homeland Security]]></keyword>          <keyword tid="13167"><![CDATA[DHS]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="13166"><![CDATA[Joshua Davis]]></keyword>          <keyword tid="5155"><![CDATA[open source]]></keyword>          <keyword tid="13165"><![CDATA[open source software]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node></nodes>