Rubies on sapphire: Recipe for making crystals in flux

Crystals can be made artificially but a lot of energy is used to melt the ingredients together, and this can make them expensive. This problem can be overcome by using appropriate solvents. Called the flux method, crystals ...

Researchers identify periods in asynchronous polars

A polar is a highly magnetic type of cataclysmic variables containing an accreting white dwarf and a low-mass donor star. Due to the magnetism, the white dwarf would synchronously spin, however, there are still several asynchronous ...

Mathematical curves predict evolution in COVID-19 spread

Efforts to contain the spread of the Covid-19 pandemic are now the top priority of governments across the globe. As they make these life-saving decisions, it is particularly crucial for policymakers to accurately predict ...

CHEOPS space telescope ready for scientific operation

CHEOPS has reached its next milestone: Following extensive tests in Earth's orbit, some of which the mission team was forced to carry out from home due to the coronavirus crisis, the space telescope has been declared ready ...

A better starting point for exploring entanglement

Quantum entanglement is perhaps one of the most intriguing phenomena known to physics. It describes how the fates of multiple particles can become entwined, even when separated by vast distances. Importantly, the probability ...

How to expand and contract curved surfaces of all shapes

Researchers at TU Delft's department of Precision and Microsystems Engineering (PME) have designed a dilation method that can be applied to any curved surface. This universal method may have a range of applications, including ...

Earth is an exoplanet to aliens: This is what they'd see

The study of exoplanets has matured considerably in the last 10 years. During this time, the majority of the over 4000 exoplanets currently known were discovered. It was also during this time that the process has started ...

Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

page 10 from 13