Skip to main content
2018-P07635 BL-6 user - Univ of Guelph-6004R_sm[2].jpg

A team of scientists, led by University of Guelph professor John Dutcher, are using neutrons at ORNL’s Spallation Neutron Source to unlock the secrets of natural nanoparticles that could be used to improve medicines.

B_Hudak_ORNL.jpg

An Oak Ridge National Laboratory-led team used a scanning transmission electron microscope to selectively position single atoms below a crystal’s surface for the first time.

Methanogen_mercury_study3.jpg

Biologists from Oak Ridge National Laboratory and the Smithsonian Environmental Research Center have confirmed that microorganisms called methanogens can transform mercury into the neurotoxin methylmercury with varying efficiency across species.

Schematic drawing of the boron nitride cell. Credit: University of Illinois at Chicago.

A new microscopy technique developed at the University of Illinois at Chicago allows researchers to visualize liquids at the nanoscale level — about 10 times more resolution than with traditional transmission electron microscopy — for the first time. By trapping minute amounts of...

An ORNL-led team used scanning transmission electron microscopy to observed atomic transformations on the edges of pores in a two-dimensional transition metal dichalcogenide. The controlled production of nanopores with stable atomic edge structures may en

An Oak Ridge National Laboratory–led team has learned how to engineer tiny pores embellished with distinct edge structures inside atomically-thin two-dimensional, or 2D, crystals. The 2D crystals are envisioned as stackable building blocks for ultrathin electronics and other advance...

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.