An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential
Shanee Dawkins, Kerrianne Buchanan, Yee-Yin Choong, Kristen K. Greene
The public safety communication technology landscape in the United States (U.S.) is evolving to supplement the use of land mobile radios with the use of a
Anna Conte, Coline Bolland, Lynn Phan, Michael Brundage, Thurston Sexton
Historical data from maintenance work orders (MWOs) is a powerful source of information to improve maintenance decisions and procedures. However, data quality
Even in the increasingly connected world of smart manufacturing and the Industrial Internet Of Things (IIOT), there will always be a need for human operators
Peter Bajcsy, Mylene Simon, Sunny Yu, Nick Schaub, Jayapriya Nagarajan, Sudharsan Prativadi, Mohamed Ouladi, Nathan Hotaling
Microscopy image-based measurement variability in high-throughput imaging experiments for biological drug discoveries, such as COVID-19 therapies was addressed
The COVID-19 pandemic has imposed new challenges to maintaining sustainability in our manufacturing operations. With such high variability in demand for
Evan Black, Samantha Gamboa Quintiliani, Richard A. Rouil
The increased complexity of network protocols and scenarios simulated using ns-3 is making the verification of simulation correctness and the analysis of
Hany Assasa, Nina Grosheva, Tanguy Ropitault, Steve Blandino, Nada T. Golmie, Joerg Widmer
The IEEE Task Group ay (TGay) has recently defined new physical and medium access control specifications to design the next generation wireless standard in the
Justin G. Whiting, Vipin Tondare, Shawn P. Moylan, Alkan Donmez
We describe a simple device called Standard Spreadability Tester (SST). The idea behind the SST is that instead of trying to predict how a powder will spread
Athira Jayakumar, D. Richard Kuhn, Brandon Simons, Aidan Collins, Smitha Gautham, Richard Hite, Raghu N. Kacker, Abhi Rajagopala, Carl Elks
The major challenge faced by the nuclear industry related to software testing of digital embedded devices is the identification of practical software (SW)
Resource and performance dependent blocking mechanisms for entanglement routing in quantum networks are identified and characterized in simulations of a DLCZ
Robots can perform various typed of automated movements in workspace. In recent years, robot applications have been expanded to a much wider scope, including
Metamorphic testing has been shown to be useful in testing "non-testable" programs in many domains. Modeling & simulation is one such domain, where both
Bernhard Garn, Daniel S. Lang, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker, Dimitris Simos
Cross-Site scripting (XSS) is a common class of vulnerabilities in the domain of web applications. As it remains prevalent despite continued efforts by
Adam J. Kopach, G. F. Nellis, David Bradley, Douglas T. Reindl, Amanda Pertzborn
The Intelligent Building Agents Laboratory (IBAL) at the National Institute of Standards and Technology (NIST) will be used to experimentally study control
Wildland fires that spread into urban areas, termed wildland-urban interface (WUI) fires, are becoming more and more common across multiple locations of the
Devastating large outdoor fires have been responsible for destruction of vast amounts of infrastructure and loss of human life. Wildland fires that spread into
Mohamed Hany, Peter Vouras, Rob Jones, Rick Candell, Kate Remley
Industrial wireless plays a crucial role in cyber-physical system (CPS) advances for the future vision of smart manufacturing. However, industrial wireless
Travis Thonstad, Jonathan Weigand, Joseph Main, Hai Lew
The National Institute of Standards and Technology is continuing its research on the mitigation of disproportionate collapse in structural systems typical of U
Himanshu Neema, Scott Phillips, Dasom Lee, David Hess, Zachariah Threet, Thomas Roth, Cuong Nguyen
Utilities and local power providers throughout the world have recognized the advantages of the "smart grid" to encourage consumers to engage in greater energy
Post-quantum cryptography has known a Cambrian Explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a
X. Lyu, M. Si, Pragya Shrestha, Kin (Charles) Cheung, P. D. Ye
In this paper, we review the ultrafast direct measurement on the transient ferroelectric polarization switching in hafnium zirconium oxide with crossbar metal
Xiaoyu Zhang, Takanori Fujiwara, Senthil K. Chandrasegaran, Michael Brundage, Thurston Sexton, Alden A. Dima, Kwan-Liu Ma
Analysis of large, high-dimensional, and heterogeneous datasets is challenging as no one technique is suitable for visualizing and clustering such data in order
There are increasing calls for systems that are able to explain themselves to their end users to increase transparency and help engender trust. But, what should
This paper addresses the problem of detecting trojans in neural networks (NNs) by analyzing how NN accuracy responds to systematic pruning. This study leverages