Skip to main content
Autonomous_vehicle_simulation_ORNL.jpg

Self-driving cars promise to keep traffic moving smoothly and reduce fuel usage, but proving those advantages has been a challenge with so few connected and automated vehicles, or CAVs, currently on the road.

Physics_silicon-detectors.jpg

Physicists turned to the “doubly magic” tin isotope Sn-132, colliding it with a target at Oak Ridge National Laboratory to assess its properties as it lost a neutron to become Sn-131.

Two neutron diffraction experiments (represented by pink and blue neutron beams) probed a salty solution to reveal its atomic structure. The only difference between the experiments was the identity of the oxygen isotope (O*) that labeled nitrate molecules

Scientists at the Department of Energy’s Oak Ridge National Laboratory used neutrons, isotopes and simulations to “see” the atomic structure of a saturated solution and found evidence supporting one of two competing hypotheses about how ions come

SmartTruck, a small business in Greenville, SC, recently completed its first detailed unsteady analysis using modeling and simulation at the OLCF and became the first company to request certification from the EPA through CFD. Image Credit: SmartTruck

Long-haul tractor trailers, often referred to as “18-wheelers,” transport everything from household goods to supermarket foodstuffs across the United States every year. According to the Bureau of Transportation Statistics, these trucks moved more than 10 billion tons of goods—70.6 ...

ORNL cybersecurity researchers Jared Smith (left) and Elliot Greenlee (right) participate in a demonstration day event to showcase how Akatosh, a new security analysis tool, quickly sorts through data to identify potential threats.

As technology continues to evolve, cybersecurity threats do as well. To better safeguard digital information, a team of researchers at the US Department of Energy’s (DOE’s) Oak Ridge National Laboratory (ORNL) has developed Akatosh, a security analysis tool that works in conjunctio...

QRNG_photo_ORNL.png

Qrypt, Inc., has exclusively licensed a novel cyber security technology from the Department of Energy’s Oak Ridge National Laboratory, promising a stronger defense against cyberattacks including those posed by quantum computing.

Sergei Kalinin, director of the Institute for Functional Imaging of Materials at Oak Ridge National Laboratory, convenes experts in microscopy and computing to gain scientific insights that will inform design of advanced materials for energy and informati

Sergei Kalinin of the Department of Energy’s Oak Ridge National Laboratory knows that seeing something is not the same as understanding it. As director of ORNL’s Institute for Functional Imaging of Materials, he convenes experts in microscopy and computing to gain scientific insigh...

Lauren Garrison

The materials inside a fusion reactor must withstand one of the most extreme environments in science, with temperatures in the thousands of degrees Celsius and a constant bombardment of neutron radiation and deuterium and tritium, isotopes of hydrogen, from the volatile plasma at th...

3D printed permanent magnets with increased density were made from an improved mixture of materials, which could lead to longer lasting, better performing magnets for electric motors, sensors and vehicle applications. Credit: Jason Richards/Oak Ridge Nati

Oak Ridge National Laboratory scientists have improved a mixture of materials used to 3D print permanent magnets with increased density, which could yield longer lasting, better performing magnets for electric motors, sensors and vehicle applications. Building on previous research, ...

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.