An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Dimitris Simos, Bernhard Garn, Ludwig Kampel, D. Richard Kuhn, Raghu N. Kacker
We present a combinatorial coverage measurement analysis for test vectors provided by the NIST Cryptographic Algorithm Validation Program (CAVP), and in
Several ontologies have been introduced in the domain of supply chain over the past decade with the promise of enabling a true supply chain interoperability
Max K. Ferguson, Seongwoon Jeong, Kincho H. Law, Anantha Narayanan Narayanan, Svetlana Levitan, Jena Tridivesh, Yung-Tsun Lee
The use of deep convolutional neural networks is becoming increasingly popular in the engineering and manufacturing sectors. However, managing the distribution
As a widely used additive manufacturing (AM) technology to produce metallic parts, powder bed fusion (PBF) is driven by a moving heat source. Thermal simulation
Vladimir Marbukh, Kamran Sayrafian, Behnam Rouzbehani, Luis Correia
This paper proposes an approach to cross-layer optimization of virtualized Radio Access Network resources in future mobile communications. Assuming that the
The Security Content Automation Protocol (SCAP) schema for source data stream collections standardizes the requirements for packaging Extensible Markup Language
We implement a cascaded interface connecting three essential frequencies for quantum communications including 1540-nm for long-distance transmission, 895-nm for
Yi Bao, Matthew Hoehler, Christopher M. Smith, Matthew Bundy, Genda Chen
This study investigates temperature distributions in steel-concrete composite slabs subjected to fire using distributed fiber optic sensors. Several 1.2 m x 0.9
Hardware/Server virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to
Vladimir P. Oleshko, William R. McGehee, Saya Takeuchi, Siyuan Zhang, Andrei A. Kolmakov, Jabez J. McClelland, Christopher L. Soles
Lithium-sulfur (Li-S) batteries have recently attracted enormous attention because of high theoretical specific energy (2600 Wh kg-1) and high specific capacity
The Information Technology Lab at NIST is developing technical standards for documentation related to systems security. The Open Security Controls Assessment
Jeffrey T. Fong, Pedro V. Marcal, Robert B. Rainsberger, Nathanael A. Heckert, James J. Filliben
When a small crack is detected in a pressure vessel or piping, we can estimate the fatigue life of the vessel or piping by applying the classical law of
Amogh Kulkarni, William Z. Bernstein, David Lechevalier, Daniel Balasubramanian, Gabor Karsai, Peter O. Denno
Unit Manufacturing Processes (UMP) are models that capture succinct definitions of individual manufacturing steps in a manufacturing system. They are used to
Software, in many different fields and tasks, has played a critical role and even replaced humans to improve efficiency and safety. However, catastrophic
Howard S. Cohl, Philipp Scharpf, Moritz Schubotz, Bela Gipp
Citation-based Information Retrieval (IR) methods for scientific documents have proven to be effective in academic disciplines that use many references. In
Michael P. Brundage, Thurston B. Sexton, Melinda Hodkiewicz, Katherine C. Morris, Jorge Arinez, Farhad Ameri, Jun Ni, Guoxian Xiao
Recent efforts in Smart Manufacturing (SM) have proven quite effective at elucidating system behavior using sensing systems, communications and computational
Felix H. Kim, Adam L. Pintar, Jason C. Fox, Jared B. Tarr, M A. Donmez, Anne-Fran?oise Obaton
A methodology to determine probability of detection (POD) of X-ray Computed Tomography (XCT) was developed using Additive Manufacturing defects. A signal
Automatic through Autonomous - Unmanned Ground Vehicles (A-UGVs), as termed by ASTM F45 for driverless industrial vehicles, have much potential for use in
Juan F. Fung, Jennifer F. Helgeson, Cheyney M. O'Fallon, David H. Webb, Harvey Cutler
Cedar Rapids, Iowa offers a unique case study in planning for increased resilience. In 2008, Cedar Rapids experienced severe flooding. Rather than simply
Patrick S. Crawford, Judith Mitrani-Reiser, Andrew Graettinger
Post-disaster studies are critical for measuring impact to communities, from physical infrastructure performance and vulnerabilities, to interdependencies with
Daniel C. Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
Group key-exchange protocols allow a set of N parties to agree on a shared, secret key by communicating over a public network. A number of solutions to this
Dipendra Jha, Aaron Gilad Kusne, Ankit Agrawal, Alok Choudhary, Reda Al-Bahrani, Nam Nguyen, Wei-keng Liao
X-ray diffraction (XRD) is a well-known technique used by scientists and engineers to determine the atomic-scale structures to understand the composition