Publications

Results 87751–87775 of 99,299

Search results

Jump to search filters

Potential applications of nanostructured materials in nuclear waste management

Wang, Yifeng

This report summarizes the results obtained from a Laboratory Directed Research & Development (LDRD) project entitled 'Investigation of Potential Applications of Self-Assembled Nanostructured Materials in Nuclear Waste Management'. The objectives of this project are to (1) provide a mechanistic understanding of the control of nanometer-scale structures on the ion sorption capability of materials and (2) develop appropriate engineering approaches to improving material properties based on such an understanding.

More Details

Safety assessment of borehole disposal of unwanted radioactive sealed sources in Egypt using Goldsim

Mattie, Patrick; Cochran, John R.

A radioactive sealed source is any radioactive material that is encased in a capsule designed to prevent leakage or escape of the radioactive material. Radioactive sealed sources are used for a wide variety of applications at hospitals, in manufacturing and research. Typical uses are in portable gauges to measure soil compaction and moisture or to determine physical properties of rocks units in boreholes (well logging). Hospitals and clinics use radioactive sealed sources for teletherapy and brachytherapy. Oil exploration and medicine are the largest users. Accidental mismanagement of radioactive sealed sources each year results in a large number of people receiving very high or even fatal does of ionizing radiation. Deliberate mismanagement is a growing international concern. Sealed sources must be managed and disposed effectively in order to protect human health and the environment. Effective national safety and management infrastructures are prerequisites for efficient and safe transportation, treatment, storage, and disposal. The Integrated Management Program for Radioactive Sealed Sources in Egypt (IMPRSS) is a cooperative development agreement between the Egyptian Atomic Energy Authority (EAEA), Egyptian Ministry of Health (MOH), Sandia National Laboratories (SNL), the University of New Mexico (UNM), and Agriculture Cooperative Development International (ACDI/VOCA). The EAEA, teaming with SNL, is conducting a Preliminary Safety Assessment (PSA) of an intermediate-depth borehole disposal in thick arid alluvium in Egypt based on experience with the U.S. Greater Confinement Disposal (GCD). Goldsim has been selected for the preliminary disposal system assessment for the Egyptian GCD Study. The results of the PSA will then be used to decide if Egypt desires to implement such a disposal system.

More Details

A low power ultra-fast current transient measuring device

Doyle, B.L.; Foltynowicz, Robert J.; Sullivan, John P.; Armendariz, Marcelino; Zutavern, Fred J.

We have studied the feasibility of an innovative device to sample 1ns low-power single current transients with a time resolution better than 10 ps. The new concept explored here is to close photoconductive semiconductor switches (PCSS) with a Laser for a period of 10 ps. The PCSSs are in a series along a Transmission Line (TL). The transient propagates along the TL allowing one to carry out a spatially resolved sampling of charge at a fixed time instead of the usual timesampling of the current. The fabrication of such a digitizer was proven to be feasible but very difficult.

More Details

Solution verification for explicit transient dynamics problems in the presence of hourglass and contact forces

Proposed for publication in Computer Methods in Applied Mechanics and Engineering Journal.

Stewart, James

This paper presents solution verification studies applicable to a class of problems involving wave propagation, frictional contact, geometrical complexity, and localized incompressibility. The studies are in support of a validation exercise of a phenomenological screw failure model. The numerical simulations are performed using a fully explicit transient dynamics finite element code, employing both standard four-node tetrahedral and eight-node mean quadrature hexahedral elements. It is demonstrated that verifying the accuracy of the simulation involves not only consideration of the mesh discretization error, but also the effect of the hourglass control and the contact enforcement. In particular, the proper amount of hourglass control and the behavior of the contact search and enforcement algorithms depend greatly on the mesh resolution. We carry out the solution verification exercise using mesh refinement studies and describe our systematic approach to handling the complicating issues. It is shown that hourglassing and contact must both be carefully monitored as the mesh is refined, and it is often necessary to make adjustments to the hourglass and contact user input parameters to accommodate finer meshes. We introduce in this paper the hourglass energy, which is used as an 'error indicator' for the hourglass control. If the hourglass energy does not tend to zero with mesh refinement, then an hourglass control parameter is changed and the calculation is repeated.

More Details

Manticore and CS mode : parallelizable encryption with joint cipher-state authentication

Anderson, William E.; Beaver, Cheryl L.; Draelos, Timothy J.; Schroeppel, Richard C.; Torgerson, Mark D.; Miller, Russell D.

We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof of security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.

More Details

Securing mobile code

Beaver, Cheryl L.; Neumann, William D.; Link, Hamilton E.; Schroeppel, Richard C.; Campbell, Philip L.; Pierson, Lyndon G.; Anderson, William E.

If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.

More Details

Radiation effects microscopy for failure analysis of microelectronic devices

Doyle, B.L.; Dodd, Paul E.; Shaneyfelt, Marty R.; Schwank, James R.

Microelectronic devices in satellites and spacecraft are exposed to high energy cosmic radiation. Furthermore, Earth-based electronics can be affected by terrestrial radiation. The radiation causes a variety of Single Event Effects (SEE) that can lead to failure of the devices. High energy heavy ion beams are being used to simulate both the cosmic and terrestrial radiation to study radiation effects and to ensure the reliability of electronic devices. Broad beam experiments can provide a measure of the radiation hardness of a device (SEE cross section) but they are unable to pinpoint the failing components in the circuit. A nuclear microbeam is an ideal tool to map SEE on a microscopic scale and find the circuit elements (transistors, capacitors, etc.) that are responsible for the failure of the device. In this paper a review of the latest radiation effects microscopy (REM) work at Sandia will be given. Different SEE mechanisms (Single Event Upset, Single Event Transient, etc.) and the methods to study them (Ion Beam Induced Charge (IBIC), Single Event Upset mapping, etc.) will be discussed. Several examples of using REM to study the basic effects of radiation in electronic devices and failure analysis of integrated circuits will be given.

More Details

Visualization of salt-induced stress perturbations

Rogers, David; Brannon, Rebecca M.

An important challenge encountered during post-processing of finite element analyses is the visualizing of three-dimensional fields of real-valued second-order tensors. Namely, as finite element meshes become more complex and detailed, evaluation and presentation of the principal stresses becomes correspondingly problematic. In this paper, we describe techniques used to visualize simulations of perturbed in-situ stress fields associated with hypothetical salt bodies in the Gulf of Mexico. We present an adaptation of the Mohr diagram, a graphical paper and pencil method used by the material mechanics community for estimating coordinate transformations for stress tensors, as a new tensor glyph for dynamically exploring tensor variables within three-dimensional finite element models. This interactive glyph can be used as either a probe or a filter through brushing and linking.

More Details

MATLAB tensor classes for fast algorithm prototyping

Bader, Brett W.

Tensors (also known as mutidimensional arrays or N-way arrays) are used in a variety of applications ranging from chemometrics to psychometrics. We describe four MATLAB classes for tensor manipulations that can be used for fast algorithm prototyping. The tensor class extends the functionality of MATLAB's multidimensional arrays by supporting additional operations such as tensor multiplication. The tensor as matrix class supports the 'matricization' of a tensor, i.e., the conversion of a tensor to a matrix (and vice versa), a commonly used operation in many algorithms. Two additional classes represent tensors stored in decomposed formats: cp tensor and tucker tensor. We descibe all of these classes and then demonstrate their use by showing how to implement several tensor algorithms that have appeared in the literature.

More Details

Direct measurement and theoretical calculation of the rate coefficient for Cl + CH3 from T = 202 - 298 K

Proposed for publication in J. Phys. Chem. A.

Klippenstein, Stephen J.

The rate coefficient has been measured under pseudo-first-order conditions for the Cl + CH{sub 3} association reaction at T = 202, 250, and 298 K and P = 0.3-2.0 Torr helium using the technique of discharge-flow mass spectrometry with low-energy (12-eV) electron-impact ionization and collision-free sampling. Cl and CH{sub 3} were generated rapidly and simultaneously by reaction of F with HCl and CH{sub 4}, respectively. Fluorine atoms were produced by microwave discharge in an approximately 1% mixture of F{sub 2} in He. The decay of CH{sub 3} was monitored under pseudo-first-order conditions with the Cl-atom concentration in large excess over the CH{sub 3} concentration ([Cl]{sub 0}/[CH{sub 3}]{sub 0} = 9-67). Small corrections were made for both axial and radial diffusion and minor secondary chemistry. The rate coefficient was found to be in the falloff regime over the range of pressures studied. For example, at T = 202 K, the rate coefficient increases from 8.4 x 10{sup -12} at P = 0.30 Torr He to 1.8 x 10{sup -11} at P = 2.00 Torr He, both in units of cm{sup 3} molecule{sup -1} s{sup -1}. A combination of ab initio quantum chemistry, variational transition-state theory, and master-equation simulations was employed in developing a theoretical model for the temperature and pressure dependence of the rate coefficient. Reasonable empirical representations of energy transfer and of the effect of spin-orbit interactions yield a temperature- and pressure-dependent rate coefficient that is in excellent agreement with the present experimental results. The high-pressure limiting rate coefficient from the RRKM calculations is k{sub 2} = 6.0 x 10{sup -11} cm{sup 3} molecule{sup -1} s{sup -1}, independent of temperature in the range from 200 to 300 K.

More Details
Results 87751–87775 of 99,299
Results 87751–87775 of 99,299