探花直播 of Cambridge - information /taxonomy/subjects/information en Opinion: How dangerous is burnt toast? /research/discussion/opinion-how-dangerous-is-burnt-toast <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/257308453091d31ee64o.jpg?itok=ThStAHFN" alt="Toast" title="Toast, Credit: Smallbrainfield" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p> 探花直播Food Standards Agency (FSA) today launched its聽Go for Gold聽campaign, encouraging us not to burn our roast or fried vegetables and keep our oven chips at a nice golden colour. 探花直播idea is to reduce people鈥檚 intake of acrylamide, a chemical that is聽鈥渃reated when many foods, particularly starchy foods like potatoes and bread, are cooked for long periods at high temperatures, such as when baking, frying, grilling, toasting and roasting.鈥澛(FSA)</p>&#13; &#13; <p>Acrylamide can be, in large doses, a very nasty substance. It is used as an industrial sealant, and workers with very high exposures suffered serious neurotoxicity. Very high doses have been shown to increase the risk of mice getting cancer. 探花直播IARC (International Agency for Research on Cancer) considers it a 鈥<a href="https://en.wikipedia.org/wiki/List_of_IARC_Group_2A_carcinogens">probable human carcinogen</a>鈥, putting it in the same category as many chemicals, red meat, being a hairdresser and shift-work.</p>&#13; &#13; <p>However, there is no good evidence of harm from humans consuming acrylamide in their diet:聽<a href="https://www.cancerresearchuk.org/about-cancer/causes-of-cancer/diet-and-cancer/food-controversies">Cancer Research UK say</a>聽that 鈥淎t the moment, there is no strong evidence linking acrylamide and cancer.鈥澛</p>&#13; &#13; <p>This is not for want of trying. A聽<a href="https://onlinelibrary.wiley.com/doi/10.2903/j.efsa.2015.4104/epdf">massive report from the European Food Standards Agency</a>聽(EFSA) lists 16 studies and 36 publications, but concludes</p>&#13; &#13; <p>In the epidemiological studies available to date, AA intake was not associated with an increased risk of most common cancers, including those of the GI or respiratory tract, breast, prostate and bladder. A few studies suggested an increased risk for renal cell, and endometrial (in particular in never-smokers) and ovarian cancer, but the evidence is limited and inconsistent. Moreover, one study suggested a lower survival in non-smoking women with breast cancer with a high pre-diagnostic exposure to AA but more studies are necessary to confirm this result.聽(p185)</p>&#13; &#13; <p>Remember that each study is testing an association with a long list of cancers, so using the standard criteria for statistical significance, we would expect 1in 20 of these associations to be positive by chance alone.</p>&#13; &#13; <p>A standard response might be the over-used clich茅: 鈥榓bsence of evidence is not evidence of absence鈥. If there has been a huge effort to find an association, and none has been found, it鈥檚 true that this may not be direct evidence of the absence of an effect (though this can never be proved anyway). But it聽can聽be considered evidence of something that is not very important.</p>&#13; &#13; <p>Given the numbers provided by EFSA and FSA, it is perhaps unsurprising that no association has been shown in large studies. EFSA calculated a BMDL10聽of 170 碌g/kg body weight/day 鈥 this means it is unlikely that exposures at this level would cause tumours in mice (technically it is the lower end of a confidence interval for the dose that would cause 10% increased tumours). They then compare this with human acrylamide exposure obtained from multiple detailed dietary surveys, which for adults has an average of 0.56 and a 鈥榟igh鈥 of 1.1 碌g/kg/day, in the sense that 97.5% of people consume less than this. 探花直播BMDL10聽is then divided by these exposures to give the 鈥榤argin of exposure鈥, which rather confusingly end up being high for low risks and low for high risks.</p>&#13; &#13; <p><img alt="" src="/system/files/screen_shot_2017-01-23_at_13.14.21.png" style="width: 565px; height: 376px;" /></p>&#13; &#13; <p>So, for example, adults with the highest consumption of acrylamide could consume 160 times as much and still only be at a level that toxicologists think unlikely to cause increased tumours in mice (that's essentially what the 鈥榤argin of exposure鈥 means).聽</p>&#13; &#13; <p>This all seems rather reassuring, and may explain why it鈥檚 been so difficult to observe any effect of acrylamide in diet. But, for cancer, toxicology committees demand a rather arbitrary margin of exposure of 10,000 before considering the chemical essentially acceptable.</p>&#13; &#13; <p>Reactions to the FSA鈥檚 Go for Gold campaign may range from the extremes of encouraging obsessive concern in the worried-well, to irate editorials on yet another intrusion from the 鈥榥anny state鈥. More worrying, people may just consider this yet another scare story from scientists, and lead them to dismiss truly important warnings about, say, the harms from obesity.</p>&#13; &#13; <p><a href="https://www.cancerresearchuk.org/about-cancer/causes-of-cancer/bodyweight-and-cancer/how-does-obesity-cause-cancer">Cancer Research UK</a> say that 鈥渞esearchers estimate that overweight and obesity are behind around 18,000 cases of cancer each year in the UK鈥. In stark contrast, the FSA provide no estimate of the current harm caused by acrylamide, nor the benefit from any reduction due to people following their advice. To be honest, I am not convinced it is appropriate to launch a public campaign on this basis.</p>&#13; &#13; <p><em> 探花直播<a href="https://wintoncentre.maths.cam.ac.uk/">Winton Centre for Risk and Evidence Communication</a> is a new centre hosted within the聽Department of Pure Mathematics and Mathematical Statistics.</em></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>A new campaign is warning people that burning some food, such as toast, is a potential cancer risk.聽Here, the evidence for this claim is explored by David Spiegelhalter,聽Professor of the Public Understanding of Risk at the new Winton Centre for Risk and Evidence Communication.聽</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">People may just consider this yet another scare story from scientists, and lead them to dismiss truly important warnings about, say, the harms from obesity</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">David Spiegelhalter</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.flickr.com/photos/smallbrainfield/257308453/in/photolist-oJLQD-zsqLr-5s7z6g-qLdS-a2MNA-4GASAR-5uidP-68Q14E-6bnK9E-2uGvxP-ecc3PB-F5Jpt-cEZvYU-4tnZuw-bdFqQ-hbxdj-477xX7-oRQWuQ-4ZcnN-zsqLR-qSpEas-5ui59-anom5h-fz8bTp-8scXYn-5rQrcV-5ZxCqj-8TvPNh-5ZxDd9-7DUhX5-2uSeZv-9esPp9-wdWw2-95C4F1-jeNmE8-aPuj-nho7Lb-2aTwSX-7E1HsC-BNrMc-RXDXZ-4S3MCe-r3sc9Y-DNK9R-pWudc5-pGaPxt-6n1cfR-38HeZT-67Eq86-2K4c55" target="_blank">Smallbrainfield</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Toast</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; 探花直播text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/attribution-noncommerical">Attribution-Noncommerical</a></div></div></div> Mon, 23 Jan 2017 08:53:32 +0000 fpjl2 183782 at Baboons watch neighbours for clues about food, but can end up in queues /research/news/baboons-watch-neighbours-for-clues-about-food-but-can-end-up-in-queues <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/news/babweb.jpg?itok=y-QTi-d2" alt="Baboon troop" title="Baboon troop, Credit: Alecia Carter" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Latest research on social networks in wild baboon troops has revealed how the animals get information from each other on the whereabouts of food. However, once information reaches a high status baboon, subordinates often end up in a queue for scraps.</p>&#13; &#13; <p>A new study, by researchers from the 探花直播 of Cambridge and the Zoological Society of London, shows how baboons monitor each other for changes in behaviour that indicate food has been found, such as hunching over to scoop it up.</p>&#13; &#13; <p>This 鈥榮ocially learned鈥 information gets transmitted through proximity: those with more neighbours are more likely to spot when someone starts feeding. Once they do, baboons will head towards the food.</p>&#13; &#13; <p>Information then starts to spread through the troop, as more baboons observe feeding behaviour or notice their neighbours moving in the direction of food. However, troop hierarchy ultimately kicks in 鈥 with the most dominant member in the vicinity, usually a male, wading in to claim the spoils.聽</p>&#13; &#13; <p>At this point, surrounding baboons will often form what can appear to be a queue, to determine who gets to explore that patch of ground next.</p>&#13; &#13; <p>These queues reflect the complex interactions within a baboon troop. 探花直播sequence of baboons in a queue depends on status 鈥 sometimes through birth-right 鈥 as well as social and familial relationships to the particular baboon occupying the food patch.</p>&#13; &#13; <p> 探花直播new research, <a href="https://elifesciences.org/articles/13125v1">published in the open access journal <em>eLife</em></a>, breaks down the transmission of social information through a baboon troop into three stages:</p>&#13; &#13; <ul><li>Acquiring information: observing behaviour that suggests food.</li>&#13; <li>Applying information: exploring the food patch (even if no food is left).</li>&#13; <li>Finally, exploiting information: actually getting to eat.</li>&#13; </ul><p> 探花直播researchers used social networking models to show how being close enough to spot behaviour change is the only driver for acquiring knowledge.</p>&#13; &#13; <p>When it comes to applying and exploiting social knowledge, however, the characteristics of individual baboons 鈥 whether its sex, status, boldness, or social ties in grooming networks 鈥 determine who gets to eat, or where they are in any queue that forms.</p>&#13; &#13; <p>Baboon troops can be sizable, sometimes as many as 100 members, with the troops in the latest study numbering around 70. On average, less than 25% of a troop 鈥 around 10 individuals 鈥 acquired information of a food patch, with less than 5% of the troop actually exploiting it.</p>&#13; &#13; <p>鈥淲ho actually gets to eat is only half the story,鈥 says Dr Alecia Carter, from Cambridge鈥檚 Department of Zoology, who led the research.</p>&#13; &#13; <p>鈥淛ust looking at the animals that capture the benefits of information, in this case food, doesn鈥檛 reflect the real pattern of how information transmits through groups. Many more animals acquire information, but are limited in their use of it for a variety of reasons.鈥</p>&#13; &#13; <p><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/wUvDHrEUDwU" width="560"></iframe></p>&#13; &#13; <p>To conduct the study, researchers snuck handfuls of maize corn kernels, a high-energy baboon favourite (鈥渓ike finding a stash of chocolate bars鈥) into the path of two foraging troops of wild chacma baboons in Tsaobis Nature Park, Namibia.</p>&#13; &#13; <p>Once a troop member found the food, the researchers recorded the identities of baboons that spotted the animal eating, accessed the food patch, and got anything to eat.</p>&#13; &#13; <p>Carter says that the best place for low-ranking baboons is often the peripheries, in the hopes of finding food and grabbing a few kernels before information spreads, and they are supplanted by the local dominant.</p>&#13; &#13; <p>鈥 探花直播more dominant a baboon is, the more spatially central in the troop they tend to be 鈥 as they can afford to be there. This provides more opportunities to gain information through the wider network,鈥 says Carter.聽聽</p>&#13; &#13; <p>Low-rankers that discover food will sometimes try to eat as stealthily or as quickly as they can, but, once a dominant has taken control of the food patch, a queue will often form. Grooming relationships to the feeding dominant can help a subordinate jump up a queue, although much of it is dictated by status.</p>&#13; &#13; <p>For females, status is a birth-right that remains fixed throughout a baboon鈥檚 life.聽While human societies historically privilege the firstborn, in baboon troops maternal lineage is ranked by lastborn 鈥 with each new female baby replacing the last in terms of hierarchy.聽</p>&#13; &#13; <p>Young males hold the same rank as their mother until they reach adolescence, usually around the age of six, and start asserting dominance through their bigger size, leading to shifts in status.聽</p>&#13; &#13; <p>鈥淚t is relatively easy to collect dominance data, as baboons are constantly asserting dominance,鈥 explains Carter. 鈥淟ow-cost assertions of dominance, such as pushing an individual out of small patches of food, help to mitigate high-cost assertions, such as fights, and maintain the order.鈥</p>&#13; &#13; <p>鈥淗owever, baboons can mediate their status to a minor extent by having good grooming relationships, and low-ranking individuals have a slightly higher chance of applying and exploiting information if they are central in a grooming network. Over a lifetime of food opportunities, this may prove important for fitness.鈥</p>&#13; &#13; <p>While baboons acquire information about food locations from watching others, they can also use social learning to see when that food is likely to be gone. Interestingly, the researchers found that males and females will often use this information in different ways.聽</p>&#13; &#13; <p>鈥淏aboons are highly vigilant, and constantly pay attention to what their neighbours are up to. When those in a food patch are sifting through dirt and clearly coming up empty-handed, most females will walk off, and won鈥檛 waste their time,鈥 says Carter.</p>&#13; &#13; <p>鈥淢ales on the other hand, particularly young males, are amazingly persistent, and will stay in a patch shifting sand around for a very long time in the hopes of finding a stray kernel.</p>&#13; &#13; <p>鈥淲e hypothesise that, while males can afford to expend the energy, adult females are lactating or pregnant most of the time, so need to conserve their strength, and often end up using the information in a more practical way as a result.鈥</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Baboons learn about food locations socially through monitoring the behaviour of those around them. While proximity to others is the key to acquiring information, research shows that accessing food depends on the complex hierarchies of a baboon troop, and those lower down the pecking order can end up queuing for leftovers.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"> 探花直播more dominant a baboon is, the more spatially central in the troop they tend to be 鈥 as they can afford to be there</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Alecia Carter</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/" target="_blank">Alecia Carter</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Baboon troop</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; 探花直播text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Wed, 20 Apr 2016 09:01:05 +0000 fpjl2 171762 at Laser technique promises super-fast and super-secure quantum cryptography /research/news/laser-technique-promises-super-fast-and-super-secure-quantum-cryptography <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/pic_4.png?itok=FjzSB_Rb" alt="Depiction of indistinguishable photons leaving through the same output port of a beam splitter" title="Depiction of indistinguishable photons leaving through the same output port of a beam splitter, Credit: Lucian Comandar" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Researchers have developed a new method to overcome one of the main issues in implementing a quantum cryptography system, raising the prospect of a useable 鈥榰nbreakable鈥 method for sending sensitive information hidden inside particles of light.</p>&#13; &#13; <p>By 鈥榮eeding鈥 one laser beam inside another, the researchers, from the 探花直播 of Cambridge and Toshiba Research Europe, have demonstrated that it is possible to distribute encryption keys at rates between two and six orders of magnitude higher than earlier attempts at a real-world quantum cryptography system. 探花直播<a href="https://dx.doi.org/10.1038/nphoton.2016.50" target="_blank">results</a> are reported in the journal <em>Nature Photonics</em>.</p>&#13; &#13; <p>Encryption is a vital part of modern life, enabling sensitive information to be shared securely. In conventional cryptography, the sender and receiver of a particular piece of information decide the encryption code, or key, up front, so that only those with the key can decrypt the information. But as computers get faster and more powerful, encryption codes get easier to break.</p>&#13; &#13; <p>Quantum cryptography promises 鈥榰nbreakable鈥 security by hiding information in particles of light, or photons, emitted from lasers. In this form of cryptography, quantum mechanics are used to randomly generate a key. 探花直播sender, who is normally designated as Alice, sends the key via polarised photons, which are sent in different directions. 探花直播receiver, normally designated as Bob, uses photon detectors to measure which direction the photons are polarised, and the detectors translate the photons into bits, which, assuming Bob has used the correct photon detectors in the correct order, will give him the key.</p>&#13; &#13; <p> 探花直播strength of quantum cryptography is that if an attacker tries to intercept Alice and Bob鈥檚 message, the key itself changes, due to the properties of quantum mechanics. Since it was first proposed in the 1980s, quantum cryptography has promised the possibility of unbreakable security. 鈥淚n theory, the attacker could have all of the power possible under the laws of physics, but they still wouldn鈥檛 be able to crack the code,鈥 said the paper鈥檚 first author Lucian Comandar, a PhD student at Cambridge鈥檚 Department of Engineering and Toshiba鈥檚 Cambridge Research Laboratory.</p>&#13; &#13; <p>However, issues with quantum cryptography arise when trying to construct a useable system. In reality, it is a back and forth game: inventive attacks targeting different components of the system are constantly being developed, and countermeasures to foil attacks are constantly being developed in response.</p>&#13; &#13; <p> 探花直播components that are most frequently attacked by hackers are the photon detectors, due to their high sensitivity and complex design 鈥 it is usually the most complex components that are the most vulnerable. As a response to attacks on the detectors, researchers developed a new quantum cryptography protocol known as measurement-device-independent quantum key distribution (MDI-QKD).</p>&#13; &#13; <p>In this method, instead of each having a detector, Alice and Bob send their photons to a central node, referred to as Charlie. Charlie lets the photons pass through a beam splitter and measures them. 探花直播results can disclose the correlation between the bits, but not disclose their values, which remain secret. In this set-up, even if Charlie tries to cheat, the information will remain secure.</p>&#13; &#13; <p>MDI-QKD has been experimentally demonstrated, but the rates at which information can be sent are too slow for real-world application, mostly due to the difficulty in creating indistinguishable particles from different lasers. To make it work, the laser pulses sent through Charlie鈥檚 beam splitter need to be (relatively) long, restricting rates to a few hundred bits per second (bps) or less.</p>&#13; &#13; <p> 探花直播method developed by the Cambridge researchers overcomes the problem by using a technique known as pulsed laser seeding, in which one laser beam injects photons into another. This makes the laser pulses more visible to Charlie by reducing the amount of 鈥榯ime jitter鈥 in the pulses, so that much shorter pulses can be used. Pulsed laser seeding is also able to randomly change the phase of the laser beam at very high rates. 探花直播result of using this technique in a MDI-QKD setup would enable rates as high as 1 megabit per second, representing an improvement of two to six orders of magnitude over previous efforts.</p>&#13; &#13; <p>鈥淭his protocol gives us the highest possible degree of security at very high clock rates,鈥 said Comandar. 鈥淚t could point the way to a practical implementation of quantum cryptography.鈥</p>&#13; &#13; <p><strong><em>Reference:</em></strong><br /><em>L.C. Comandar et al. 鈥<a href="https://dx.doi.org/10.1038/nphoton.2016.50" target="_blank">Quantum key distribution without detector vulnerabilities using optically seeded lasers</a>.鈥 Nature Photonics (2016). DOI: 10.1038/nphoton.2016.50</em></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>A new method of implementing an 鈥榰nbreakable鈥 quantum cryptographic system is able to transmit information at rates more than ten times faster than previous attempts.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">This protocol gives us the highest possible degree of security at very high clock rates</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Lucian Comandar</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/" target="_blank">Lucian Comandar</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Depiction of indistinguishable photons leaving through the same output port of a beam splitter</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; 探花直播text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Mon, 04 Apr 2016 15:06:38 +0000 sc604 170652 at Intelligent airports and greener smart phones: award-winning Cambridge innovation /research/news/intelligent-airports-and-greener-smart-phones-award-winning-cambridge-innovation <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/innovation2.jpg?itok=1sZjTcHJ" alt="Phone home" title="Phone home, Credit: Ian Crowther from Flickr" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Airport queues. No one likes them, but in the modern world we鈥檝e come to accept them as part of our travel routine. Equally, many people these days would struggle without their smart phones, but they take a toll on the environment and are expensive to produce.</p>&#13; <p>Cambridge research that aims to tackle these issues has been celebrated at the UK ICT Pioneers Competition, an Engineering and Physical Sciences Research Council initiative which recognises the work of exceptional PhD students and researchers in the information and communications technologies.</p>&#13; <p><strong> 探花直播intelligent airport</strong></p>&#13; <p>As demand for flights increases, airports are becoming increasingly congested, but environmental concerns make expansion a contentious issue. Sithamparanathan Sabesan, from the Department of Engineering, believes that tagging could provide an answer. 探花直播real-time, accurate identification of passengers and their luggage to within a metre of their locations would dramatically increase efficiency in security checks, lost luggage recovery, delayed passengers and the daily ebb and flow of air travel.</p>&#13; <p>鈥楶assive鈥 tags have no batteries, making them viably cheap to produce; the key is devising a reliable method of detecting these tags with such accuracy, and over much greater distances than previously possible. Sabesan says he and his collaborators - Dr Michael Crisp, Prof. Richard Penty and Prof. Ian White - have cracked it using radio frequencies, and they鈥檝e created a proof of principle demonstrator to show it works.</p>&#13; <p>鈥淥ur demonstrator shows that this system could be 100 per cent accurate, as well as locating passive tags to within a metre, overtaking current conventional systems,鈥 says Sabesan. 鈥淭hese breakthroughs are paving the way for a wide range of new applications. Key players in retail, airlines, manufacturers and document tracking have offered us trials, which we expect to carry out in 12-24 months.鈥</p>&#13; <p>It is predicted that the Real Time Locations System (RTLS) could save airlines in excess of 拢400m, as well as significantly reducing the now traditional airport waiting times. Other industries have also shown interest in the project. Retail groups are looking at the technology with a view to shrinking checkout queues and reducing shoplifting. Sabesan, who came to Cambridge to work with 探花直播 spin-off company ARM Ltd before beginning his PhD in 2008, won the Connected World category at the ICT awards. He currently has two patents pending for his work and has just been elected to a junior research fellowship at Girton College.</p>&#13; <p><strong>Green touchscreens</strong></p>&#13; <p> 探花直播Innovation for Sustainability category was won by Jens Christensen, also from the Department of Engineering, for his research into acoustic pulse recognition, and its application in the world of smart phones. Whilst the sight of people tapping and swiping at their mobile phone screen has become commonplace, it is the noises and vibrations resulting from these actions that Christensen is interested in.</p>&#13; <p>By processing the various sounds into commands such select, scroll, zoom etc, the technology developed by Christensen and his colleagues at Input Dynamics converts every external edge of the phone into a touch-sensitive surface. 探花直播software uses existing microphones that most handsets carry, so it can be fitted with a few tweaks to enhance functionality and even add touch command capabilities to non-touch phones in a cost-effective way.</p>&#13; <p>鈥淐urrent touchscreen implementations rely on compounds that are in limited supply and consequently extremely expensive, which has an impact on both the environment and the consumer,鈥 says Christensen. 鈥淥ur technology TouchDevice鈩 dispenses with all of this by making better use of the hardware already present in the device.鈥</p>&#13; <p> 探花直播possible applications for the technology are vast as, in theory, walls and tables could be activated using microphones and the acoustic software. Could this potentially spell the end for such everyday staples as the light switch and the</p>&#13; <p>TV remote?</p>&#13; <p>鈥淢y research has applications far beyond what I have been able to imagine. This technology is highly customisable and any surface could potentially be made active, so that the technology can adapt to the user rather than the other way around.鈥</p>&#13; <p>Christensen went on to take an additional prize at the ICT Pioneer awards, following a pitch to a 鈥楧ragons Den鈥 style panel of academics and industry experts. TouchDevice鈩 was voted by the panel to have the strongest commercial case, with Chief Executive of EPSRC Professor David Delpy describing the technology as 鈥渁 win for both the customers and industry, fulfilling an unmet customer demand and satisfying the industry's need for newer and cheaper technologies鈥.</p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Two Cambridge researchers have received prizes at the ICT Pioneers awards for their groundbreaking approach to modern problems.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">My research has applications far beyond what I have been able to imagine.&quot;</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jens Christensen</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/" target="_blank">Ian Crowther from Flickr</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Phone home</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by-nc-sa/3.0/"><img alt="" src="/sites/www.cam.ac.uk/files/80x15.png" style="width: 80px; height: 15px;" /></a></p>&#13; <p>This work is licensed under a <a href="http://creativecommons.org/licenses/by-nc-sa/3.0/">Creative Commons Licence</a>. If you use this content on your site please link back to this page.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Wed, 13 Apr 2011 09:59:42 +0000 bjb42 26231 at