Preview

Diagnostics And Hardware Upgrades At The Low Background Counting Facility

Better Essays
Open Document
Open Document
1483 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Diagnostics And Hardware Upgrades At The Low Background Counting Facility
Greavu 1

My UROP Experience:
Diagnostics and Hardware Upgrades at the Low Background Counting Facility

John Greavu
Sponsor: Professor Priscilla Cushman
June 4, 2014

My project this past spring involved the Soudan Underground Laboratory’s Low Background Counting Facility. The Low Background Counting Facility, or LBCF, is housed next to the Super Cryogenic Dark Matter Search (SuperCDMS) half-a-mile underground in an old northern Minnesota iron mine which has now been converted into a fully-equipped modern physics lab. The LBCF is a 40 x 35 x 100 ft. hall with an active muon veto shield—left over from the Soudan 2 proton decay experiment— lining nearly all of the facility, save for the floor. Also inside the LBCF is a neutron multiplicity meter, capable of fast neutron searches. This and the muon veto shield provide for interesting studies of environments with an ultra low flux of particles, studies crucial for understanding and developing the field underground physics. Such studies have applications in many exciting areas of contemporary physics, such as SuperCDMS and other dark matter searches (for one, neutrons can be virtually indistinguishable from WIMPs in the data), as well as searches for neutrino-less double beta decay, or any rare event searches, really.

The goals this semester were to understand the veto shield and its tendencies as well as implement upgrades to the Soudan shield while using the partial local shield setup as a test bed for possible hardware changes. Myself, alongside another UROP undergraduate research assistant, Joe Jeffers, worked with Professor Cushman and post-doctoral students Anthony Villano and Matthew Fritts in this endeavor.

In January, we moved the local shield setup from the old Tate Laboratory of Physics to Lab 450 in the new Physics and Nanotechnology building. The shield is made up of daisy-chained hexagonal aluminum gas proportional tubes, each with a gold wire strung down the middle to relay information about ionizing

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2130 Lab

    • 191 Words
    • 1 Page

    1. An amino acid consists of a carbon atom attached to a hydrogen atom, an amine group, a side group, and a _____________ group.…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Prudent Solutions

    • 1251 Words
    • 6 Pages

    We have developed a new process that makes spent nuclear rods inert rendering them harmless.…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    References: Arthur, C. (2012, May 29). Cyber-Attack Concerns Raised Over Boeing 787 Chip’s Back Door. Retrieved…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    On every project it is my responsibility to implement efficient and cost effective methods for planning, monitoring, evaluating the tests of new and modified systems and equipment. While installing a building-wide liquid nitrogen delivery system for the FDA, (GS11P12YEC0032), we experienced many unique and challenging issues. It was part of my job to ensure we overcame those obstacles in the most effective and cost effective way possible. When we discovered a valve bracket failure, we had to come up with a method of correcting the problem with minimum effect on the project scope schedule and costs. When we discovered the soil where the nitrogen tank was to be installed was not sufficient, I called in a soil engineer…

    • 1095 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, “an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure” (p.165).…

    • 650 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ST KeystonePredator 2014

    • 5994 Words
    • 48 Pages

    This laboratory is based on a series of famous experiments that were conducted in the 1960’s along…

    • 5994 Words
    • 48 Pages
    Powerful Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Secured VLAN deployment for devices that meet this standard and cannot meet more intelligent solutions such as security posture assessment.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NETW202 W7 Lab

    • 916 Words
    • 3 Pages

    This iLab allowed me to practice setting up the initial switch configuration and enhancing its security. I believe that it allows me to see the importance of this weeks TCO’s and work with other coruse materials well enough to get a better understanding of them. I believe this will allow me to set up security protocols in my future career and my academic life.…

    • 916 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Means of enforcement of security policy should be a primary consideration throughout the research, test and implementation phases of any security technology. Careful research, review of manufacturer’s documentation, questions presented to vendors and manufacturers, and testing of the technology can serve to meet this criteria. Without a method of enforcement, effectiveness of security policy is questionable at best. While audit trails, hardware analysis and security logs should be reviewed regularly; it is a time-intensive process and this alone alerts the administrator to violations and security threats…

    • 601 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Every summer since high school, I worked at Lawrence Livermore Laboratory as a research assistant. One of my major projects…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Beginning with the Manhattan Project in the 1940’s, Oak Ridge, TN has been a Mecca for cutting edge equipment, research and scientific development. In 1946, two University of Tennessee professors “were discussing the merits of linking the valuable scientific resources developed in Oak Ridge as part of the Manhattan Project with regional universities.” because “The schools did not have access to such high-tech equipment.” (“Oak Ridge Associated Universities”, 2012). That discussion was the beginning of what was to become Oak Ridge Associated Universities (ORAU), a consortium of over 100 universities, laboratories, and government projects that are networked to establish “collaborative partnerships that enhance the scientific research and education enterprise of our nation”. (“Oak Ridge Associated Universities”, 2012). ORAU has since made a name for itself for furthering scientific education and research and being the company to provide working solutions for numerous problems.…

    • 2097 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Assignment

    • 2454 Words
    • 14 Pages

    For the sake of time, many repetitive but important configuration tasks have been omitted from this activity. Many of these tasks, especially those related to device security, are essential elements of a network configuration. The intent of this activity is not to diminish the importance of full device configurations.…

    • 2454 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    The Soudan Underground Laboratory is a half-mile underground physics lab in the Soudan iron mine in northern Minnesota. The muon veto shield is an active muon-tracking device, which is a restored remnant of the hall’s previous tenants: the Soudan 1 and 2 proton decay searches. Throughout the last decade, the shield has been refurbished and provided with new custom electronics and a LabView-based data-acquisition system. The shield is constructed from panels of gas proportional tubes, filled with 90% Ar and 10% CO2, which nearly completely cover the ceiling and walls of the counting facility. Each panel is extruded aluminum formed into eight hexagonal wire chamber tubes, which are arranged in a honeycomb-like double layer as shown at the right of Fig 1. Each tube contains a gold wire strung down the center, which is connected in series to the three other wires from the other tubes in the same column, constituting one “channel”. The facility is divided into four…

    • 1346 Words
    • 4 Pages
    Better Essays