Skip to main content
SPRUCE experiment

Oak Ridge National Laboratory scientists evaluating northern peatland responses to environmental change recorded extraordinary fine-root growth with increasing temperatures, indicating that this previously hidden belowground mechanism may play an important role in how carbon-rich peatlands respond to warming.

Map with focus on sub-saharan Africa

Researchers at Oak Ridge National Laboratory developed a method that uses machine learning to predict seasonal fire risk in Africa, where half of the world’s wildfire-related carbon emissions originate.

Computational biophysicist Ada Sedova is using experiments and high-performance computing to explore the properties of biological systems and predict their form and function, including research to accelerate drug discovery for COVID-19. Photo credit: Jason Richards, Oak Ridge National Laboratory, U.S. Dept. of Energy.

Ada Sedova’s journey to Oak Ridge National Laboratory has taken her on the path from pre-med studies in college to an accelerated graduate career in mathematics and biophysics and now to the intersection of computational science and biology

Eriophorum vaginatum flourishes in the tundra biome

An international team of scientists found that rules governing plant growth hold true even at the edges of the world in the Arctic tundra.

Smart Neighborhood homes

To better determine the potential energy cost savings among connected homes, researchers at Oak Ridge National Laboratory developed a computer simulation to more accurately compare energy use on similar weather days.

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.