Scientists identify a plant molecule that sops up iron-rich heme
The peptide is used by legumes to control nitrogen-fixing bacteria; it may also offer leads for treating patients with too much heme in their blood.
The peptide is used by legumes to control nitrogen-fixing bacteria; it may also offer leads for treating patients with too much heme in their blood.
Researchers found that an understudied component of computer processors is susceptible to attacks from malicious agents. Then, they developed mitigation mechanisms.
Engineers 3D print materials with networks of sensors directly incorporated.
More complete than existing methods, the new approach might enable longer operational lifetimes for nuclear reactors.
Researchers train a machine-learning model to monitor and adjust the 3D printing process to correct errors in real-time.
The technique opens a door to manufacturing of pressure-monitoring bandages, shade-shifting fabrics, or touch-sensing robots.
New stamp-sized ultrasound adhesives produce clear images of heart, lungs, and other internal organs.
Researchers have found a material that can perform much better than silicon. The next step is finding practical and economic ways to make it.
Methods that make a machine-learning model’s predictions more accurate overall can reduce accuracy for underrepresented subgroups. A new approach can help.
A new technique could improve the precision of atomic clocks and of quantum sensors for detecting dark matter or gravitational waves.
Their swirling, clustering behavior might someday inform the design of self-assembling robotic swarms.
The findings could inform the design of practical superconducting devices.
This robotic system uses radio frequency signals, computer vision, and complex reasoning to efficiently find items hidden under a pile.
By tracing the steps of liver regrowth, MIT engineers hope to harness the liver’s regenerative abilities to help treat chronic disease.
Researchers demonstrate two security methods that efficiently protect analog-to-digital converters from powerful attacks that aim to steal user data.