skip to main content


Search for: All records

Award ID contains: 2152168

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available January 31, 2025
  2. Free, publicly-accessible full text available January 4, 2025
  3. Sb thin films have attracted wide interest due to their tunable band structure, topological phases, high electron mobility, and thermoelectric properties. We successfully grow epitaxial Sb thin films on a closely lattice-matched GaSb(001) surface by molecular beam epitaxy. We find a novel anisotropic directional dependence on their structural, morphological, and electronic properties. The origin of the anisotropic features is elucidated using first-principles density functional theory (DFT) calculations. The growth regime of crystalline and amorphous Sb thin films was determined by mapping the surface reconstruction phase diagram of the GaSb(001) surface under Sb2 flux, with confirmation of structural characterizations. Crystalline Sb thin films show a rhombohedral crystal structure along the rhombohedral (211) surface orientation parallel to the cubic (001) surface orientation of the GaSb substrate. At this coherent interface, Sb atoms are aligned with the GaSb lattice along the [1Ģ„10] crystallographic direction but are not aligned well along the [110] crystallographic direction, which results in anisotropic features in reflection of high-energy electron diffraction patterns, misfit dislocation formation, surface morphology, and transport properties. Our DFT calculations show that the preferential orientation of the rhombohedral Sb (211) plane may originate from the GaSb surface, where Sb atoms align with the Ga and Sb atoms on the reconstructed surface. The formation energy calculations confirm the stability of the experimentally observed structures. Our results provide optimal film growth conditions for further studies of novel properties of Bi1āˆ’xSbx thin films with similar lattice parameters and an identical crystal structure, as well as functional heterostructures of them with IIIā€“V semiconductor layers along the (001) surface orientation, supported by a theoretical understanding of the anisotropic film orientation.

     
    more » « less
    Free, publicly-accessible full text available January 1, 2025
  4. Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facilityā€™s control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation.

     
    more » « less