Localized gradients in magnetic fields have long-range effects on the concentration of rare earth ions in solution, facilitating field-driven extraction of critical minerals.
Hydrogen preferentially inserts at grain boundaries between interconnected chains of palladium nanoparticles, which have a lower energy barrier for hydrogen incorporation into the material.
Distributed science is thriving at PNNL, where scientists share data and collaborate with researchers around the world to increase the impact of the work.
Nanoscale domains of magnetically susceptible critical materials encounter enhanced magnetic interactions under external magnetic fields, providing a promising new avenue for separations.
Researchers at PNNL shared advances in artificial intelligence, cybersecurity, advanced imaging, and more at the Department of Homeland Security Research, Development, Test, and Evaluation Summit.
The ability of a storm-resolving weather model to predict the growth of storms over central Argentina was evaluated with data from the Clouds, Aerosols, and Complex Terrain Interactions (CACTI) field campaign in central Argentina.
PNNL recently hosted a training exercise that immersed the U.S. Coast Guard 2013 Cyber Protection Team in a lifelike simulation of a cyberattack on a U.S. port terminal.
Atmospheric aerosol particles modulate climate and the Earth’s energy balance by scattering and absorbing sunlight. They also seed clouds, acting as cloud condensation nuclei.
Extensive in situ and remote sensing measurements were collected to address data gaps and better understand the interactions of convective clouds and the surrounding environment.
Properly identifying iodoplumbate species that are present and stable in a perovskite precursor solution is vital. New research offers insight into reactivity and dynamical processes in solution and the chemical properties of precursors.
CESER and PNNL convened a three-day summit with more than 100 state officials, cybersecurity experts, and industry leaders across 35 states to advance energy security planning, cyber risk assessment, and fortify protections against attacks.