Other

“After more than a century, physicists aim to dethrone the tried-and-tested technology of the refrigerator, as cooling can be made more energy-efficient. The compressor technology used in today’s refrigerators was invented more than a century ago. “The technology has …

“Researchers have created a quantum superposition state in a semiconductor nanostructure that might serve as a basis for quantum computing. The trick: two optical laser pulses that act as a single terahertz laser pulse. A German-Chinese research team has successfully …

“The new sensor design resembles a molecular toolbox that can be used to quickly assemble sensors for a variety of purposes. An interdisciplinary research team from Bochum, Duisburg and Zurich has developed a new approach to construct modular optical sensors …

“With an innovative approach, Bochum scientists and international colleagues are creating new standards for data security in the cache of electronic devices. Huge streams of data pass through our computers and smartphones every day. In simple terms, technical devices contain …

“A new project aims to aid the fast and efficient production of customised steel workpieces. Some workpieces can’t be successfully manufactured using conventional methods such as casting. In such cases, the obvious choice is to use an additive manufacturing …

“Carbon nanotubes not only shine brighter in the presence of dopamine, but also for longer. The time period of shining serves as a new parameter to detect biological messenger substances. An interdisciplinary research team from Bochum and Duisburg has found …

“Using a new technique, researchers were able to observe live what happens in the first picosecond when a proton detaches from a dye after exposure to light. In certain molecules, the so-called photoacids, a proton can be released locally by …

“Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering. Security gaps exist not only in software, but also directly in hardware. Attackers …

“Even though mathematically verifiable secure encryption algorithms do exist, in practice attackers manage to hijack data on a regular basis. This is because encryption doesn’t happen merely in theory. Secure electronic circuits are indispensable for transponder keys, card readers …

“The potential for energy and material savings offered by additive manufacturing compared to conventional processes is enormous. But the devil is in the details. Metal components can not only be designed more flexibly using 3D printing. So-called additive manufacturing also …