Imagine a team of humans, dogs, robots and drones swooping onto the scene in the aftermath of a disaster and working together to find and rescue anyone trapped in collapsed buildings. That’s the goal of a team of researchers from around the United States working on what they call the Smart Emergency Response System (SERS).
If you want teens to avoid risky behavior, you can’t just give teenagers the facts – you have to get them to engage with the information, feel motivated to change, and have the confidence and skills to keep themselves safe. That’s the idea behind a project under way at NC State and the University of
Computer security researchers have found that Android smartphone manufacturers are inadvertently incorporating new vulnerabilities into their products when they customize the phones before sale, according to a recent study. On average, the researchers found that 60 percent of the vulnerabilities found in the smartphone models they evaluated were due to such “vendor customizations.” A paper
In Kenya, water is power. Literally. And to keep the lights on, Kenyan authorities want to know how much water they can expect in upcoming rainy seasons. That’s where computer models come in. Fifty-eight percent of Kenya’s power supply stems from the country’s hydropower system in the Tana River basin. That system will shut down
NC State students wrote the book on analyzing “big data” – sifting useful information out of the sea of business, personal and other data available online and elsewhere. Or at least they’ve written a book about mining that big data. Nagiza Samatova, a professor of computer science at NC State, and four Ph.D. students are