Polyphase wireless power transfer system achieves 270-kilowatt charge, s...
Filter News
Area of Research
- (-) Clean Energy (13)
- (-) Isotopes (1)
- (-) Supercomputing (34)
- Advanced Manufacturing (1)
- Biology and Environment (10)
- Computational Engineering (1)
- Computer Science (2)
- Fusion and Fission (8)
- Fusion Energy (2)
- Materials (25)
- Materials for Computing (3)
- National Security (11)
- Neutron Science (13)
- Nuclear Science and Technology (2)
- Quantum information Science (1)
News Topics
- (-) Biomedical (8)
- (-) Clean Water (1)
- (-) Cybersecurity (7)
- (-) Fusion (1)
- (-) Microscopy (8)
- (-) Quantum Science (10)
- (-) Summit (14)
- 3-D Printing/Advanced Manufacturing (29)
- Advanced Reactors (3)
- Artificial Intelligence (15)
- Big Data (2)
- Bioenergy (15)
- Biology (7)
- Biotechnology (3)
- Buildings (8)
- Chemical Sciences (10)
- Climate Change (9)
- Composites (5)
- Computer Science (33)
- Coronavirus (8)
- Critical Materials (4)
- Decarbonization (10)
- Energy Storage (28)
- Environment (16)
- Exascale Computing (8)
- Fossil Energy (1)
- Frontier (12)
- Grid (11)
- High-Performance Computing (12)
- Isotopes (7)
- Machine Learning (8)
- Materials (22)
- Materials Science (16)
- Mercury (1)
- Molten Salt (1)
- Nanotechnology (7)
- National Security (7)
- Net Zero (1)
- Neutron Science (10)
- Nuclear Energy (6)
- Partnerships (8)
- Physics (4)
- Polymers (5)
- Quantum Computing (5)
- Renewable Energy (1)
- Security (6)
- Simulation (2)
- Space Exploration (1)
- Sustainable Energy (24)
- Transformational Challenge Reactor (3)
- Transportation (18)
Media Contacts
Scientists at the Department of Energy’s Oak Ridge National Laboratory are the first to successfully simulate an atomic nucleus using a quantum computer. The results, published in Physical Review Letters, demonstrate the ability of quantum systems to compute nuclear ph...
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.