Skip to main content
ORNL researchers in advanced manufacturing, materials science and engineering collaborated to produce face shields and reusable mask molds so that industry can quickly mass produce. Credit: Carlos Jones/Oak Ridge National Laboratory, U.S. Dept. of Energy

The University of Texas at San Antonio (UTSA) has formally launched the Cybersecurity Manufacturing Innovation Institute (CyManII), a $111 million public-private partnership.

Computational biophysicist Ada Sedova is using experiments and high-performance computing to explore the properties of biological systems and predict their form and function, including research to accelerate drug discovery for COVID-19. Photo credit: Jason Richards, Oak Ridge National Laboratory, U.S. Dept. of Energy.

Ada Sedova’s journey to Oak Ridge National Laboratory has taken her on the path from pre-med studies in college to an accelerated graduate career in mathematics and biophysics and now to the intersection of computational science and biology

Starch granules

Scientists at the Department of Energy’s Oak Ridge National Laboratory have developed a new method to peer deep into the nanostructure of biomaterials without damaging the sample. This novel technique can confirm structural features in starch, a carbohydrate important in biofuel production.

Examples from the ORNL Overhead Vehicle Dataset, generated with images captured by GRIDSMART cameras. Image: Thomas Karnowski/ORNL

Each year, approximately 6 billion gallons of fuel are wasted as vehicles wait at stop lights or sit in dense traffic with engines idling, according to US Department of Energy estimates.

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.