NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
A major scientifically based investigation of the WTC disaster was completed recently by NIST. The investigations establish the technical causes of building
Polarized optical scatter measurements yield information that can be used to identify sources of scatter. In this chapter, we review measurements of angle
Kotikalapudi Sriram, David W. Griffith, G Di Lorenzo, Oliver Borchert, Nada T. Golmie
Agile all optical cross-connect (OXC) switches currently use an architecture in which regenerators and transceivers have pre-assigned and fixed directionality
Leonard M. Hanssen, Benjamin K. Tsai, Sergey Mekhontsev
A new capability for the measurement of the temperature-dependent emittance of specular samples in the near infrared spectral region has been developed in NIST
Benjamin K. Tsai, Kenneth G. Kreider, William A. Kimes
The advent of the cable-less lightpipe radiation thermometer (CLRT) has resulted in a significant improvement in the accuracy of lightpipe radiation thermometer
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, Ronald Boisvert, Charles W. Clark, Carl J. Williams, A Gross, E Hagley, J Wen
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the
Maciej Myslinski, Dominique Schreurs, Catherine A. Remley, Michael McKinley, Bart Nauwelaers
This work presents a large-signal time-domain behavioral model of an off-the-shelf RF amplifier based on QPSK-like multisine measurements. The multisine has
The Federal Building and Fire Safety Investigation of the World Trade Center Disaster is currently essentially completed. The pre-collapse progression was
Jun-Feng Song, Theodore V. Vorburger, Li Ma, John M. Libert, Susan M. Ballou
Based on the maximum cross-correlation function, CCFmax, a new parameter called signature difference, Ds, is developed for verifying the similarity of the 2D
Interest in dense sensor networks due to falling price and reduced size has motivated research in sensor location in recent years. While many algorithms can be
Adriana Hornikova, Nien F. Zhang, Michael J. Welch, Susan S. Tai
NIST Standard Reference Materials (SRM) are certified reference materials that are developed at NIST and provided to laboratories (industry, government and
A challenge for search systems is to detect not only when an item is relevant to the user's information need, but also when it contains something new which the
Our goal is to produce metrics for measuring the effectiveness of software tools and environments produced for the intelligence community. To this end we need
We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in
Embedding metadata within a media file format becomes evermore popular for digital media. Traditional digital media files such as MP3 songs and JPEG photos do
As a qubit is a two-level system whose state space is spanned by and , so a qudit is a -level system whose state space is spanned by ,..., . Quantum computation
There is a clear need for evaluation methodologies specifically suited to ubiquitous computing applications. Here we investigate a user evaluation framework we
A simple technique to estimate the position of a given mobile source inside a building is based on the received signal strength. For this methodology to have a
The XML metadata technology of describing media contents has emerged as a dominant mode of making media searchable both for human and machine consumptions. To
P J. Phillips, P J. Flynn, W T. Scruggs, K W. Bowyer, J S. Chang, K Hoffman, J Marques, J Min, W Worek
Over the last couple of years, face recognition researchers have been developing new techniques, such as recognition from three-dimensional and high resolution
We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in
With the mass deploy of cameras, concern has risen about protecting a person's privacy as he goes about his daily life. Many of the cameras are installed to
In this paper we examine the performance of robot systems that use two different techniques for situation awareness for operators of robots in an urban search
This paper describes an approach for relaying in multihop networks that adapts to the time-varying channel and exploits spatial diversity to mitigate multipath
For the past two years we have been involved in evaluation of software technologies designed to improve analysis. We have been conducting evaluations both in