Skip to content ↓

Topic

Computer Science and Artificial Intelligence Laboratory (CSAIL)

Download RSS feed: News Articles / In the Media / Audio

Displaying 211 - 225 of 706 news clips related to this topic.
Show:

Fierce Biotech

Researchers at MIT have developed an artificial intelligence sensor that can track the progression of Parkinson’s disease in patients based on their breathing while they sleep, reports Conor Hale for Fierce Biotech. “The device emits radio waves and captures their reflection to read small changes in its immediate environment,” writes Hale. “It works like a radar, but in this case, the device senses the rise and fall of a person’s chest.”

Boston.com

MIT researchers have developed a new artificial intelligence system that uses a person’s breathing pattern to help detect Parkinson’s sisease, reports Susannah Sudborough for Boston.com. “The device emits radio signals, analyzes reflections off the surrounding environment, and monitors the person’s breathing patterns without any bodily contact,” writes Sudborough.

STAT

Researchers at MIT and other institutions have developed an artificial intelligence tool that can analyze changes in nighttime breathing to detect and track the progression of Parkinson’s disease, reports Casey Ross for STAT. “The AI was able to accurately flag Parkinson’s using one night of breathing data collected from a belt worn around the abdomen or from a passive monitoring system that tracks breathing using a low-power radio signal,” writes Ross.

Forbes

Prof. Andrew Lo speaks with Forbes contributor Russell Flannery about his work using finance to help lower the cost of drug development for cancer treatment and therapies. “I started thinking about how we could use finance pro-actively to lower the cost of drug development, increase success rates, and make it more attractive for investors,” says Lo. “Because that's really what the issue is: you need investors to come into the space to spend their billions of dollars in order to get these drugs developed.”

Fast Company

Fast Company reporter Elissaveta Brandon writes that a team of scientists from MIT and elsewhere have developed an amphibious artificial vision system inspired by the fiddler crab’s compound eye, which has an almost 360-degree field of view and can see on both land and water. “When translated into a machine,” writes Brandon, “this could mean more versatile cameras for self-driving cars and drones, both of which can become untrustworthy in the rain.”

Wired

Wired reporter Will Knight spotlights a study by researchers from MIT and other universities that finds judges are turning to Wikipedia for guidance when making legal decisions. “The researchers also found evidence that the use of Wikipedia reflects an already stretched system,” writes Knight. “The legal decisions that included Wikipedia-influenced citations were most often seen in the lower courts, which they suspect reflects how overworked the judges are.”

Popular Mechanics

The MIT mini cheetah broke a speed record after learning to adapt to difficult terrain and upping its speed, reports Rienk De Beer for Popular Mechanics.

Independent

Researchers from CSAIL and elsewhere have found that Irish judges are using Wikipedia articles as a source in their rulings, reports Shane Phelan for Independent. “This work shows that Wikipedia reaches even farther than that, into high-stakes, formalized processes like legal judgments,” says research scientist Neil Thompson. “The worst outcome would be for a judge’s reliance on Wikipedia to lead them to decide a case differently than they would have if they had read either an expert secondary source or the cited precedent itself.”

Popular Science

Researchers from CSAIL, Cornell University, and Maynooth University have released a study concluding that judges in Ireland are utilizing Wikipedia articles to help inform their decisions, reports Colleen Hagerty for Popular Science. Based on their findings, the researchers suggest “the legal community increases its efforts to monitor and fact-check legal information posted on Wikipedia.” 

Forbes

MIT researchers have developed a new system that enabled the mini robotic cheetah to learn to run, reports John Koetsier for Forbes. ““Traditionally, the process that people have been using [to train robots] requires you to study the actual system and manually design models,” explains Prof. Pulkit Agrawal. “This process is good, it’s well established, but it’s not very scalable. “But we are removing the human from designing the specific behaviors.”

STAT

A study co-authored by MIT researchers finds that algorithms based on clinical medical notes can predict the self-identified race of a patient, reports Katie Palmer for STAT. “We’re not ready for AI — no sector really is ready for AI — until they’ve figured out that the computers are learning things that they’re not supposed to learn,” says Principal Research Scientist Leo Anthony Celi.

New Scientist

CSAIL graduate student Yunzhu Li and his colleagues have trained a robot to use two metal grippers to mold letters out of play dough, reports Jeremy Hsu for New Scientist. "Li and his colleagues trained a robot to use two metal grippers to mould the approximate shapes of the letters B, R, T, X and A out of Play-Doh," explains Hsu. "The training involved just 10 minutes of randomly manipulating a block of the modelling clay beforehand, without requiring any human demonstrations."

TechCrunch

TechCrunch reporter Brian Heater spotlights multiple MIT research projects, including MIT Space Exploration Initiative’s TESSERAE, CSAIL’s Robocraft and the recent development of miniature flying robotic drones.

Popular Science

Researchers from MIT have discovered a hardware vulnerability in Apple’s M1 chip using an attack called PACMAN, reports Harry Guinness for Popular Science. “Attackers can only use PACMAN to exploit an existing memory bug in the system, which can be patched,” explained Guinness.

Gizmodo

CSAIL researchers have found a security vulnerability in Apple’s M1 chip, reports Philip Tracy for Gizmodo. “The flaw could theoretically give bad actors a door to gain full access to the core operating system kernel,” explains Tracy.