An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Safety levels are a public policy decision made by regulators and not the technical community. It is appropriate for the technical community to suggest...
In order to increase the chances of survival during a fire emergency, the time available for a person to leave the danger zone must be longer than the time...
Tall buildings present a unique and challenging egress environment. The very aspect ratio which makes tall buildings economically desirable accentuates the...
A major scientifically based investigation of the WTC disaster was completed recently by NIST. The investigations establish the technical causes of building...
Polarized optical scatter measurements yield information that can be used to identify sources of scatter. In this chapter, we review measurements of angle...
Kotikalapudi Sriram, David W. Griffith, G Di Lorenzo, Oliver Borchert, Nada T. Golmie
Agile all optical cross-connect (OXC) switches currently use an architecture in which regenerators and transceivers have pre-assigned and fixed directionality...
Leonard M. Hanssen, Benjamin K. Tsai, Sergey Mekhontsev
A new capability for the measurement of the temperature-dependent emittance of specular samples in the near infrared spectral region has been developed in NIST...
Benjamin K. Tsai, Kenneth G. Kreider, William A. Kimes
The advent of the cable-less lightpipe radiation thermometer (CLRT) has resulted in a significant improvement in the accuracy of lightpipe radiation thermometer...
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, Ronald Boisvert, Charles W. Clark, Carl J. Williams, A Gross, E Hagley, J Wen
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the...
Maciej Myslinski, Dominique Schreurs, Catherine A. Remley, Michael McKinley, Bart Nauwelaers
This work presents a large-signal time-domain behavioral model of an off-the-shelf RF amplifier based on QPSK-like multisine measurements. The multisine has...
P J. Phillips, P J. Flynn, W T. Scruggs, K W. Bowyer, J S. Chang, K Hoffman, J Marques, J Min, W Worek
Over the last couple of years, face recognition researchers have been developing new techniques, such as recognition from three-dimensional and high resolution...
With the mass deploy of cameras, concern has risen about protecting a person's privacy as he goes about his daily life. Many of the cameras are installed to...
This paper describes an approach for relaying in multihop networks that adapts to the time-varying channel and exploits spatial diversity to mitigate multipath...
Designers of distributed software systems often rely on server replicas for increased robustness, scalability, and performance. Replicated server architectures...
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of...
Jun-Feng Song, Theodore V. Vorburger, Li Ma, John M. Libert, Susan M. Ballou
Based on the maximum cross-correlation function, CCFmax, a new parameter called signature difference, Ds, is developed for verifying the similarity of the 2D...
Interest in dense sensor networks due to falling price and reduced size has motivated research in sensor location in recent years. While many algorithms can be...
A challenge for search systems is to detect not only when an item is relevant to the user's information need, but also when it contains something new which the...
Our goal is to produce metrics for measuring the effectiveness of software tools and environments produced for the intelligence community. To this end we need...
We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in...
Embedding metadata within a media file format becomes evermore popular for digital media. Traditional digital media files such as MP3 songs and JPEG photos do...
As a qubit is a two-level system whose state space is spanned by and , so a qudit is a -level system whose state space is spanned by ,..., . Quantum computation...
There is a clear need for evaluation methodologies specifically suited to ubiquitous computing applications. Here we investigate a user evaluation framework we...
A simple technique to estimate the position of a given mobile source inside a building is based on the received signal strength. For this methodology to have a...
The XML metadata technology of describing media contents has emerged as a dominant mode of making media searchable both for human and machine consumptions. To...
We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in...
In this paper we examine the performance of robot systems that use two different techniques for situation awareness for operators of robots in an urban search...