An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Currently, the electricity demand is exponentially increasing due to the population growth. Therefore, the demand side management (DSM) is becoming unavoidable
Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Network attack is still a major security concern for organizations worldwide. Recently, researchers have started to apply neural networks to detect network
Aaron M. Hanke, Teodor Vernica, William Z. Bernstein
Interoperability across emerging visualization modalities, including augmented reality (AR) and virtual reality (VR), remains a challenge with respect to
Ian Soboroff, Ben Carterette, Rosie Jones, Gareth Jones, Maria Eskevich, Sravana Reddy, Ann Clifton, Yongze Yu, Jussi Karlgren
Rapidly growing online podcast archives contain diverse content on a wide range of topics. These archives form an important resource for entertainment and
Newell Moser, Dohyun Leem, Liao Shuheng, Kornel Ehmann, Jian Cao
Double-Sided Incremental Forming (DSIF) is a rapid-prototyping manufacturing process for metal forming that, for low-volume production, is competitively energy
Ellen M. Voorhees, Ian Soboroff, Nick Craswell, Bhaskar Mitra, Emine Yilmaz, Daniel Campos
The TREC Deep Learning (DL) Track studies ad hoc search in the large data regime, meaning that a large set of human-labeled training data is available. Results
Shared text collections continue to be vital infrastructure for IR research. The COVID-19 pandemic offered an opportunity to create a test collection that
A thriving manufacturing sector is the essential heart of a vibrant and balanced economy in the United States(U.S.). Small and medium manufacturers (SMMs)
Mariella Särestöniemi, Carlos Pomalaza Raez, Kamran Sayrafian, Jari Iinatti
This paper presents the results of an in-body propagation study for abdominal implant communication using a bio-matched mini-horn antenna. The wireless signal
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential
Shanee Dawkins, Kerrianne Buchanan, Yee-Yin Choong, Kristen K. Greene
The public safety communication technology landscape in the United States (U.S.) is evolving to supplement the use of land mobile radios with the use of a
Anna Conte, Coline Bolland, Lynn Phan, Michael Brundage, Thurston Sexton
Historical data from maintenance work orders (MWOs) is a powerful source of information to improve maintenance decisions and procedures. However, data quality
Even in the increasingly connected world of smart manufacturing and the Industrial Internet Of Things (IIOT), there will always be a need for human operators
Peter Bajcsy, Mylene Simon, Sunny Yu, Nick Schaub, Jayapriya Nagarajan, Sudharsan Prativadi, Mohamed Ouladi, Nathan Hotaling
Microscopy image-based measurement variability in high-throughput imaging experiments for biological drug discoveries, such as COVID-19 therapies was addressed
Justin G. Whiting, Vipin Tondare, Shawn P. Moylan, Alkan Donmez
We describe a simple device called Standard Spreadability Tester (SST). The idea behind the SST is that instead of trying to predict how a powder will spread
The COVID-19 pandemic has imposed new challenges to maintaining sustainability in our manufacturing operations. With such high variability in demand for
Evan Black, Samantha Gamboa Quintiliani, Richard A. Rouil
The increased complexity of network protocols and scenarios simulated using ns-3 is making the verification of simulation correctness and the analysis of
Hany Assasa, Nina Grosheva, Tanguy Ropitault, Steve Blandino, Nada T. Golmie, Joerg Widmer
The IEEE Task Group ay (TGay) has recently defined new physical and medium access control specifications to design the next generation wireless standard in the
Athira Jayakumar, D. Richard Kuhn, Brandon Simons, Aidan Collins, Smitha Gautham, Richard Hite, Raghu N. Kacker, Abhi Rajagopala, Carl Elks
The major challenge faced by the nuclear industry related to software testing of digital embedded devices is the identification of practical software (SW)
Resource and performance dependent blocking mechanisms for entanglement routing in quantum networks are identified and characterized in simulations of a DLCZ
Robots can perform various typed of automated movements in workspace. In recent years, robot applications have been expanded to a much wider scope, including
Metamorphic testing has been shown to be useful in testing "non-testable" programs in many domains. Modeling & simulation is one such domain, where both
Bernhard Garn, Daniel S. Lang, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker, Dimitris Simos
Cross-Site scripting (XSS) is a common class of vulnerabilities in the domain of web applications. As it remains prevalent despite continued efforts by
Adam J. Kopach, G. F. Nellis, David Bradley, Douglas T. Reindl, Amanda Pertzborn
The Intelligent Building Agents Laboratory (IBAL) at the National Institute of Standards and Technology (NIST) will be used to experimentally study control
Wildland fires that spread into urban areas, termed wildland-urban interface (WUI) fires, are becoming more and more common across multiple locations of the
Devastating large outdoor fires have been responsible for destruction of vast amounts of infrastructure and loss of human life. Wildland fires that spread into
Mohamed Hany, Peter Vouras, Rob Jones, Rick Candell, Kate Remley
Industrial wireless plays a crucial role in cyber-physical system (CPS) advances for the future vision of smart manufacturing. However, industrial wireless