Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Projects/Programs

Displaying 201 - 225 of 225

Stem Cell Metrology: WSDOM

Ongoing
Stem cells are critical starting materials for advanced therapies and diagnostic devices. The most commonly used are induced pluripotent stem cells (iPSCs) which can be created with any individual’s skin cells, and then can be coaxed to become cells for any tissue of the body. Therapies and...

Systems Analysis Integration

Ongoing
Purpose & Goal The purpose of the SAI Project is to reduce redundant and inconsistent information about systems and their analysis across the multiple engineering disciplines involved. Redundant and inconsistent information exists between: Systems and analysis models: discipline-specific analysis...

U.S. TAG for ISO/TC276: Biotechnology

Ongoing
Get involved: Interested U.S. Stakeholders may participate in the US TAG at no cost. Membership provides access to all ISO/TC 276 and US TAG documents, including standards under development. Please click here to join. Contribute to standards development: Please click here to review, submit comment...

Tattoo Recognition Technology

Ongoing
Tattoo Recognition Technology - Evaluation (Tatt-E) Tatt-E is a large-scale sequestered evaluation of tattoo recognition algorithms to support operationally relevant use cases, including tattoo identification, region of interest, tattoo detection/localization, matching sketches. For more information...

Tattoo Recognition Technology-Challenge (Tatt-C)

Completed
Tatt-C Publications September 15, 2015: The first public report on Tatt-C has been published as NISTIR 8078 – Tattoo Recognition Technology – Challenge (Tatt-C) Outcomes and Recommendations. March 24, 2015: (The Tatt-C dataset is no longer available for public distribution) Mei Ngan and Patrick...

Tattoo Recognition Technology-Evaluation (Tatt-E)

Completed
2018-Oct-31: Tatt-E report published The public report on Tatt-E has been published as NISTIR 8232 - Tattoo Recognition Technology - Evaluation (Tatt-E) Performance of Tattoo Identification Algorithms. The report documents empirical evaluation of 12 tattoo recognition algorithms from two providers...

Technical Security Guidance Program

Ongoing
This program can increase the security of computer systems, networks, and data. It will increase understanding of new security technologies and the security implications of new IT technologies. Specifically, the program can have the following impacts: - Eliminate duplication of efforts across...

Temporal Computing

Ongoing
In standard integrated circuits, information that is coded as ones and zeros is implemented by voltages on wires being high or low. The circuits consume energy during transitions between these voltages. Binary numbers have a voltage per bit so there are a lot of transitions each time a number...

Text Recognition Algorithm Independent Evaluation (TRAIT 2016)

Ongoing
2017-DEC-15 – TRAIT Final Report now available The outcomes of the TRAIT activity have been published as NISTIR 8199 - The Text Recognition Algorithm Independent Evaluation (TRAIT). 2016-SEPT-08 – Phase 3 API now available The C++ API for algorithms, validation package , participation...

Training and optimization of hardware neural networks

Ongoing
The goal of this project is to develop a general method that can train many different types of neural networks, and to demonstrate and evaluate their performance on new emerging hardware. We aim to develop and demonstrate training on diverse hardware platforms, and in the presence of realistic noise...

Trustworthy Intelligent Networks

Ongoing
Our current research efforts include: The application of AI/ML techniques to detect abuse of the Domain Name System (DNS). The development of measurement techniques to characterize the robustness of AI/ML approaches to botnet detection. The application of AI/ML techniques to detect anomalies in the...

Trustworthy Networks Program

Ongoing
The need for Trustworthy Networking Internet Society Report on the Future of the Internet “Perhaps the most pressing danger to the future of the Internet is the rising scope and breadth of Cyber Threats.” “Addressing cyber threats should be the priority” “The scale of cyberattacks is steadily...

Trustworthy Networks of Things

Ongoing
Our work focuses on network-centric approaches to improve the security and robustness of large scale deployments of IoT devices. The research and development of software-defined networking technologies in support of IoT security. The design and IETF standardization of Manufacturer Usage Description...

Usability for Biometric Systems

Ongoing
In order to improve the usability of biometric systems, it is critical to take a holistic approach that considers the needs of users as well as the entire experience users will have with a system, including the hardware, software and instructional design of a system. Adopting a user-centric view of...

USGv6 Program

Ongoing
OMB has directed [ OMB-2020, OMB-2010, OMB-2005] the National Institute of Standards and Technology (NIST) to develop the technical infrastructure (standards and testing) necessary to support wide-scale adoption of IPv6 in the US Government (USG). In response, NIST developed a technical standards...

Visualization

Ongoing
Current visualization technology provides a full range of hardware and techniques from static two-dimensional plots, to interactive three-dimensional images projected onto a monitor, to large screen fully immersive systems allowing the user to interact on a human scale. Immersive virtual reality...

Waveform Metrology Project

Ongoing
Optical measurement techniques: NIST uses the electro-optic sampling (EOS) technique to measure the vector response of photodiodes and provide phase traceability for commercial instrumentation, such as large-signal network analyzers, lightwave component analyzers, vector signal analyzers...

WEBAPI

Ongoing
Measurement is difficult due to the complexity of the underlying technologies being addressed. In addition, measuring conformance in web applications requires large test sets covering a wide a range of standards. Currently, W3C WEB Applications working group members are responsible for developing...

Wireless Coexistence

Ongoing
What is Wireless Coexistence? Wireless coexistence is the capability of multiple wireless devices and services in the same geographical area to access the same RF spectrum band simultaneously without causing harmful interference to each other. In other words, can they all operate successfully and...

XML Technologies

Ongoing
The Extensible Markup Language (XML) and the related XML-based recommendations provides a core infrastructure that will enable this next level of web applications. The success of this technology will be dependent upon the industry's ability to produce applications that are interoperable. Within...

Zeno

Ongoing
The Zeno software tool computes material, solution, and suspension properties for a specified particle shape or molecular structure using path-integral and Monte Carlo methods. The software was originally developed in Fortran77 at the Stevens Institute of Technology with support from NIST MML. ITL...
Was this page helpful?