Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Effect On Focusing Fields By Ferromagnetic Cell Cores In Linear Induction Accelerators, Cooper Guillaume May 2023

Effect On Focusing Fields By Ferromagnetic Cell Cores In Linear Induction Accelerators, Cooper Guillaume

Senior Honors Theses

In the Los Alamos National Laboratories DARHT facility, there are two perpendicular linear induction accelerators, LIAs. The LIAs’ solenoids produce magnetic fields which focus the electron beam. Simultaneously, the accelerating pulse creates a magnetic field. These two field intensities act upon a ferromagnetic material in the cells to enhance magnetic flux density. Due to the nonlinearity of the material, this flux density will reach a saturation point. In turn, the magnetic field intensity of the axial solenoidal magnetic field will be affected and slightly altered. The width of the electron beam will increase, causing a decrease in effectiveness. Through simulation, …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell Apr 2015

Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell

Senior Honors Theses

Voice signals are inherently analog, and some voice communication systems still utilize analog signals. Existing analog cryptographic methods do not satisfactorily provide cryptosecurity for communication systems due to several limitations. This paper proposes a novel means of provided cryptosecurity for analog signals without digitization; thereby avoiding the latency which results from ADC/DAC conversions. This method utilizes the principles of the digital stream cipher, generating instead a continuous pseudorandom analog key stream signal which is transformed with the original analog signal to create an encrypted ciphertext signal which is statistically independent of the original signal and the key stream signal. The …