An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Kayla Ibrahim, Suryadipta Majumdar, Daniel Bastos, Anoop Singhal
Internet of Things (IoT) is being widely adopted in recent years. Security, however, has lagged behind, as evidenced by the increasing number of attacks that...
Ryan Falkenstein-Smith, Kunhyuk Sung, Jian Chen, Anthony Hamins
This work documents a series of time-averaged local gas species measurements made throughout the centerline profile of 30 cm methanol, ethanol, and acetone pool...
Kassiopeia A. Smith, Bryan T. Bosworth, Nicholas R. Jungwirth, Jerome G. Cheron, Nathan D. Orloff, Christian J. Long, Dylan F. Williams, Richard A. Chamberlin, Franklyn J. Quinlan, Tara M. Fortier, Ari D. Feldman
A combination of on-wafer metrology and high-frequency network analysis was implemented to measure the response of transmission-line integrated Er-GaAs and...
Rob Horansky, Diogo Ribeiro, Jeffrey Jargon, Kate Remley
In the 5G, millimeter-wave frequency region, over-the-air testing is integral to verifying communications systems. Calibration of these vector systems will...
Kunhyuk Sung, Jian Chen, Matthew Bundy, Anthony Hamins
A series of measurements was made to characterize the structure of a 1 m diameter methyl 12 alcohol (methanol; CH3OH) pool fire steadily burning with a constant...
Teodor I. Vernica, Aaron M. Hanke, William Z. Bernstein
Due to its tremendous potential, Augmented Reality (AR) has experienced a recent surge in adoption and integration within the manufacturing enterprise. While...
Michael P. Brundage, Senthil K. Chandrasegaran, Xiaoyu Zhang, Kwan-Liu Ma
Maintenance and error logs for machines in manufacturing organizations are typically written as informal notes by operators or technicians working on the...
As Smart Manufacturing becomes more prevalent throughout industry, manufacturers are continuing to look for ways to more efficiently apply advanced data...
Wai Cheong Tam, Eugene Yujun Fu, Amy E. Mensch, Anthony P. Hamins, Christina Yu, Grace Ngai, Hong va Leong
This paper presents a study to examine the potential use of machine learning models to build a real-time detection algorithm for prevention of unattended...
Identifying heavy flows, i.e., flows with high packet rate (or count), is vital for many network applications such as anomaly detection, network operation...
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone, Daniel C. Apon, Javier Verbel
In 2013, Tao et al. introduced the ABC Simple Matrix Scheme for Encryption, a multivariate public key encryption scheme. The scheme boasts great efficiency in...
Jairo Giraldo, CheeYee Tang, David Urbina, Alvaro A. Cardenas
Industrial Control Systems (ICS) collect information from a variety of sensors throughout the process, and then use that information to control some physical...
Bradley Potteiger, Himanshu Neema, Xenofon Koutsoukos, CheeYee Tang, Keith A. Stouffer
The last decade has seen an influx of digital connectivity, operation automation, and remote sensing and control mechanisms in the railway domain. The...
Thomas P. Roth, Cuong T. Nguyen, Martin J. Burns, Himanshu Neema
Cyber-physical systems (CPS) use logical computation informed by measurements of the environment to actuate changes on the physical world. These systems have...
Denis E. Bergeron, Ryan P. Fitzgerald, Leticia S. Pibida
Recent renewed interest in radium-224 (224Ra) as a radiotherapeutic agent prompted the development of a primary standard for activity at the National Institute...
Siyuan Huang, Brian D. Hoskins, Matthew W. Daniels, Mark D. Stiles, Gina C. Adam
Faster and more energy efficient hardware accelerators are critical for machine learning on very large datasets. The energy cost of performing vector-matrix...
Howard S. Cohl, Andre Greiner Petter, Moritz Schubotz, Corinna Breitinger, Fabian Muller, Akiko Aizawa, Bela Gipp
Mathematical notation, i.e., the writing system used to communicate concepts in mathematics, encodes valuable information for a variety of information search...
Samantha M. Gamboa Quintiliani, Alexandre C. Moreaux, David W. Griffith, Richard A. Rouil
The UE-to-Network Relay functionality was introduced to Long Term Evolution (LTE) cellular networks in Release 13. In this technology, User Equipment (UEs)...
Madhulika S. Korde, Regis J. Kline, Daniel Sunday, Nick Keller, Subhadeep Kal, Cheryl Alix, Aelen Mosden, Alain C. Diebold
The three-dimensional architectures for field effect transistors (FETs) with vertical stacking of Gate-all-Around Nanowires provide a pathway to increased...
Luis Miaja Avila, Ann C. Chiaramonti Debay, Benjamin W. Caplins, David R. Diercks, Brian Gorman, Norman A. Sanford
We present a different approach to laser-assisted atom probe tomography, where instead of using a near-UV laser for inducing a thermal transient, we use an...
Siyuan Feng, Hyong-Ah Choi, David W. Griffith, Richard A. Rouil
The Third Generation Partnership Project (3GPP) defines various pre-configured channel parameters for the Long- Term Evolution (LTE) Device-to-Device (D2D)...
Accurate, optics-based measurement of feature sizes at deep sub-wavelength dimensions has been conventionally challenged by improved manufacturing, including...
Vivian W. Wong, Max Ferguson, Kincho Law, Yung-Tsun Lee, Paul Witherell
Segmentation of defects in additive manufacturing is challenging, due to the poor contrast, small sizes and variation in appearance of defects. Automatic...
Working with industry labs quickly introduces one to activities of standard development organizations, who publish test methods, and accrediting bodies, who...
Daniel B. Gopman, Jian-Ping Wang, Tony Low, Weigang Wang, William Taylor
Magnetic random access memory (MRAM) based on perpendicular magnetic tunnel junctions (pMTJs) is one of the core building blocks for beyond-CMOS technologies...
Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Advanced Persistent Threats (APT) has become the concern of many enterprise networks. APT can remain undetected for a long time span and lead to undesirable...
Instrumental capabilities for both relative and absolute gravity measurements can be made at the parts in 10 9 level of precision. Large but still portable...
A summary and overview of a public workshop on machine learning for optical Communication systems held on August 2nd 2019, by the Communications Technology...