An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Mahesh Mani, Kevin W. Lyons, Alexander P. Muroyama, Bjorn J. Johansson
Sustainability has become a ubiquitous term in almost every field, especially in engineering design and manufacturing. Recently, an increased awareness of
Antoine Fillinger, Lukas Diduch, Imad Hamchi, Vincent M. Stanford
The need for very large fingerprint benchmarks to test the efficacy of emerging commercial technologies for fingerprint minutia detection, matching, compression
Disassembly process is an essential activity in the mid and end of a products service life cycle. Maintenance is a mid product life activity, which involves
This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing
Michael C. Gibbons, Svetlana Z. Lowry, Matthew T. Quinn
HITECH Act's provisions to drive adoption and meaningful use of Electronic Health Records (EHRs) holds great promise in supporting improvements in the quality
Patrick J. Grother, Wayne J. Salamon, Craig I. Watson, Michael D. Indovina, Patricia A. Flanagan
The MINEX II trials have been conducted to evaluate the accuracy and speed of MATCH-ON-CARD verification algorithms. These run on ISO/IEC 7816 smartcards. They
Michael D. Indovina, R. A. Hicklin, G I. Kiebuzinski
ELFT-EFS Evaluation 1 is an evaluation of the accuracy of latent matching using features marked by experienced human latent fingerprint examiners. The purpose
Ram D. Sriram, Conrad E. Bock, Fabian M. Neuhaus, Evan K. Wallace, Mary C. Brady, Mark Musen, Joanne Luciano
The National Institute for Standards and Technology sponsored a workshop in October, 2007, on the subject of ontology evaluation. An international group of
J. R. Beveridge, P. Jonathon Phillips, Geof H. Givens, Bruce A. Draper, Mohammad N. Teli, David Bolme
In face recognition, quality is typically thought of as a property of individual images, not image pairs. The implicit assumption is that high-quality images
Alice J. O'Toole, P. Jonathon Phillips, Xiaobo An, Joseph Dunlop
The intended applications of automatic face recognition systems include venues that vary widely in demographic diversity. Formal evaluations of algorithms do
P J. Phillips, J. R. Beveridge, Bruce A. Draper, Geof H. Givens, Alice J. O'Toole, David Bolme, Joseph Dunlop, Yui M. Lui, Hassan A. Sahibzada, Samuel Weimer
The Good, the Bad, & the Ugly Face Challenge Problem was created to encourage the development of algorithms that are robust to recognition across changes in
Sarah E. Baker, Patrick J. Flynn, Kevin W. Bowyer, P. Jonathon Phillips
We present results of the first systematic study to investigate the degree to which template aging occurs for iris biometrics. Our experiments use an image data
This report recommends best practices for development and deployment of modeling, simulation and analysis (MS&A) tools for homeland security applications. The
In video communications the compressed video stream is very likely to be corrupted by channel errors. In order to combat these channel errors, many methods have
The success of biometric applications is particularly dependent on the interoperability of biometric systems. Deploying these systems requires a comprehensive
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800
Diane Mauchant, Michael A. Riley, Kirk D. Rice, Amanda L. Forster, Dennis D. Leber, Daniel V. Samarov
The performance standard for ballistic-resistant body armor published by the National Institute of Justice (NIJ), NIJ Standard 0101.06, recommends estimating
The American Concrete Institute in 2010 defined internal curing as supplying water throughout a freshly placed cementitious mixture using reservoirs, via pre
Output of the NIST Smart Grid Interoperability Panel's Priority Action Plan 2: Wireless Communication for smart Grid, working group. It contains a methodology
The so-called 20 kips frame (MTS table-top machine), equipped with a 100 kN load cell with serial No. 850, was used in the period April-December 2010 to perform
This report summarizes the technical work of the Applied and Computational Sciences Division (ACMD) of NIST s Information Technology Laboratory. Part I
Dale P. Bentz, Chiara F. Ferraris, James J. Filliben
One major objective of the sustainable construction movement is to decrease the energy and carbon dioxide footprints of concrete. Since the production of
The advent of new imaging technologies has allowed faster and higher-resolution cellular image acquisition by light microscopy. This has directly aided clinical
A mixture fraction formulation is used to numerically simulate the two-dimensional structure of diluted axisymmetric methane-air nonpremixed counterflow flames
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST