Dustin Peterson

Learn More
A new device (TwinSol) installed at the Nuclear Structure Laboratory at the University of Notre Dame implements a pair of large-bore 6-tesla superconducting solenoids for producing relatively pure, high-intensity beams of exotic light nuclei at low-energies (10 to 80 MeV). Typical beams include 8 Li and 6 He (T 1/2 < 1 sec.). The device efficiently(More)
  • G V Rogachev, J J Kolata, F D Becchetti, P A Deyoung, M Hencheck, K Herrund +12 others
  • 2001
The elastic scattering of protons on 7 Be has been measured in the energy region from 1-3.3 MeV via the thick-target technique. The data conclusively demonstrate the existence of a 2 − state at an excitation energy of approximately 3.5 MeV in 8 B, and rule out a predicted 1 + state near 1.4 MeV. The relevance of these results for the 7 Be (p,γ) reaction, of(More)
—FPGA circuit implementation is a unidirectional and time-consuming process. Existing approaches like the incremental synthesis try to shorten it, but still need to execute the whole flow for a changed circuit partition. Other approaches circumvent process stages by providing bidirectional mappings between their results. In this paper we propose an approach(More)
We propose a method to produce usable amounts (1 to 100/s) of low-energy, very neutron-, proton-rich or highly-polarized radioactive nuclear beams (RNBs) via a two-stage production method which utilizes a high-intensity secondary RNB with a second production target. As an example: 7 Li+ 9 Be → 8 Li → 8 Li+ 9 Be → 9 Li. The latter (9 Li) is very difficult to(More)
In the continued absence of an effective anti-HIV vaccine, approximately 2 million new HIV infections occur every year, with over 95% of these in developing countries. Calls have been made for the development of anti-HIV drugs that can be formulated for topical use to prevent HIV transmission during sexual intercourse. Because these drugs are principally(More)
Providing secure access to confidential information is extremely difficult, notably when regarding weak endpoints and users. With the increasing number of corporate espionage cases and data leaks, a usable approach enhancing the security of data on endpoints is needed. In this paper we present our implementation for providing a new level of security for(More)