Skip to main content
Image
cyber

CSP-POST provides the capability to inspect all incoming and outgoing emails while providing after-the-fact forensic capabilities. Using commercially available lightweight and serverless technologies, CSP-POST easily collects all email and parses it into easily searchable metadata, enriched and ready for analysis. The web-based application is deployed in a repeatable, testable, and auditable…

Image
A system to cryptographically distinguish between human-generated text vs. AI-generated text

LLNL has invented a new system that uses public key cryptography to differentiate between human-generated text and AI-generated text. This invention can be used to validate that text is likely to be human generated for the purposes of sorting or gatekeeping on the internet, can detect cheating on essay assignments, and can be used as an automatic captcha that does away with the hassle of…

Image
Plasma wind
CRETIN is a 1D, 2D, and 3D non-local thermodynamic equilibrium (NLTE) atomic kinetics/radiation transport code which follows the time evolution of atomic populations and photon distributions as radiation interacts with a plasma consisting of an arbitrary mix of elements. It can provide detailed spectra for comparing with experimental diagnostics.
Image
Encrypting computer clusters

LLNL has developed a new method for securely processing protected data on HPC systems with minimal impact on the existing HPC operations and execution environment. It can be used with no alterations to traditional HPC operations and can be managed locally. It is fully compatible with traditional (unencrypted) processing and can run other jobs, unencrypted or not, on the cluster simultaneously…

Image
Intrinsic Use Control

LLNL's method of equivalent time sampling incorporates an embedded system that generates the pulses used to trigger the external circuit and the data acquisition (DAQ). This removes the external reference clock, allowing the overall system clock rate to change based on the ability of the embedded system. The time delays needed to create the time stepping for equivalent time sampling is done by…

Image
Toy model demonstration of a Napier Deltic Engine. Thermo-structural analysis in Diablo with piston pressure. Simrev software-twin is seven python modules; pistons, crank-arms, gears, etc.; and a main program. Total 600 lines of code.

Simrev is a python library imported into a user-generated program. As the program grows in capability and complexity, the engineered product matures. The "software twin" handles all changes to product configuration and is the portal to running supercomputing analysis and managing workflow for engineering simulation codes. Assemblies become program modules; parts, materials, boundary conditions…

Image
Cell phone 2

LLNL's NeMS system enables network mapping operations by using two LLNL-developed software systems: LLNL's NeMS tool and the Everest visualization system. Each software system can be also used separately for their specific applications. When the two systems are used together as an iterative analysis platform, LLNL's NeMS system provides network security managers and information technology…