Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Effect On Focusing Fields By Ferromagnetic Cell Cores In Linear Induction Accelerators, Cooper Guillaume
Effect On Focusing Fields By Ferromagnetic Cell Cores In Linear Induction Accelerators, Cooper Guillaume
Senior Honors Theses
In the Los Alamos National Laboratories DARHT facility, there are two perpendicular linear induction accelerators, LIAs. The LIAs’ solenoids produce magnetic fields which focus the electron beam. Simultaneously, the accelerating pulse creates a magnetic field. These two field intensities act upon a ferromagnetic material in the cells to enhance magnetic flux density. Due to the nonlinearity of the material, this flux density will reach a saturation point. In turn, the magnetic field intensity of the axial solenoidal magnetic field will be affected and slightly altered. The width of the electron beam will increase, causing a decrease in effectiveness. Through simulation, …
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Senior Honors Theses
For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …
Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell
Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell
Senior Honors Theses
Voice signals are inherently analog, and some voice communication systems still utilize analog signals. Existing analog cryptographic methods do not satisfactorily provide cryptosecurity for communication systems due to several limitations. This paper proposes a novel means of provided cryptosecurity for analog signals without digitization; thereby avoiding the latency which results from ADC/DAC conversions. This method utilizes the principles of the digital stream cipher, generating instead a continuous pseudorandom analog key stream signal which is transformed with the original analog signal to create an encrypted ciphertext signal which is statistically independent of the original signal and the key stream signal. The …