First mathematical analysis of gun policy tradeoff emphasizes need for more data
Study using OpenStreetMap and mathematics reveals there are only four unique city topologies
Fluid mechanics suggests alternative to quantum orthodoxy
The central mystery of quantum mechanics is that small chunks of matter sometimes seem to behave like particles, sometimes like waves. For most of the past century, the prevailing explanation of this conundrum ...
Researchers use math and observation to show neural networks in crustaceans have evolved to offer optimized swimming
Neanderthals and humans had 'ample time' to mix
Humans and Neanderthals may have coexisted in Europe for more than 5,000 years, providing ample time for the two species to meet and mix, according to new research.
Study finds order in the apparent randomness of Earth's evolving landscape
(Phys.org) —As we all know, water runs downhill, forming channels and branched networks as it flows. It's been that way forever. But, believe it or not, scientists' understanding of these networks hasn't ...
Soap films with complex shapes shed light on the formation of mathematical singularities (w/ Video)
(Phys.org) —Soap films with complex shapes shed light on the formation of mathematical singularities, which occur in a broad range of fields.
Proving uncertainty: First rigorous formulation supporting Heisenberg's famous 1927 principle
Nearly 90 years after Werner Heisenberg pioneered his uncertainty principle, a group of researchers from three countries has provided substantial new insight into this fundamental tenet of quantum physics ...
Researchers build model that may explain how plate tectonics got its start
Hunt for an 'unidentified electron object'
New research sheds light on the nature of 'unidentified electron objects'—a mysterious class of objects that exists in superfluid helium at low temperature.
Math model suggests fishing out older members may destroy collective fish school memory
Computer generated math proof is too large for humans to check
Mathematicians calculate that there are 177,147 ways to knot a tie
New cyber-attack model helps hackers time the next Stuxnet
Of the many tricks used by the world's greatest military strategists, one usually works well – taking the enemy by surprise. It is an approach that goes back to the horse that brought down Troy. But surprise ...