NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We implement a cascaded interface connecting three essential frequencies for quantum communications including 1540-nm for long-distance transmission, 895-nm for
Yi Bao, Matthew Hoehler, Christopher M. Smith, Matthew Bundy, Genda Chen
This study investigates temperature distributions in steel-concrete composite slabs subjected to fire using distributed fiber optic sensors. Several 1.2 m x 0.9
Hardware/Server virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to
Vladimir P. Oleshko, William R. McGehee, Saya Takeuchi, Siyuan Zhang, Andrei A. Kolmakov, Jabez J. McClelland, Christopher L. Soles
Lithium-sulfur (Li-S) batteries have recently attracted enormous attention because of high theoretical specific energy (2600 Wh kg-1) and high specific capacity
The Information Technology Lab at NIST is developing technical standards for documentation related to systems security. The Open Security Controls Assessment
Jeffrey T. Fong, Pedro V. Marcal, Robert B. Rainsberger, Nathanael A. Heckert, James J. Filliben
When a small crack is detected in a pressure vessel or piping, we can estimate the fatigue life of the vessel or piping by applying the classical law of
Software, in many different fields and tasks, has played a critical role and even replaced humans to improve efficiency and safety. However, catastrophic
Howard S. Cohl, Philipp Scharpf, Moritz Schubotz, Bela Gipp
Citation-based Information Retrieval (IR) methods for scientific documents have proven to be effective in academic disciplines that use many references. In
Amogh Kulkarni, William Z. Bernstein, David Lechevalier, Daniel Balasubramanian, Gabor Karsai, Peter O. Denno
Unit Manufacturing Processes (UMP) are models that capture succinct definitions of individual manufacturing steps in a manufacturing system. They are used to
Michael P. Brundage, Thurston B. Sexton, Melinda Hodkiewicz, Katherine C. Morris, Jorge Arinez, Farhad Ameri, Jun Ni, Guoxian Xiao
Recent efforts in Smart Manufacturing (SM) have proven quite effective at elucidating system behavior using sensing systems, communications and computational
Felix H. Kim, Adam L. Pintar, Jason C. Fox, Jared B. Tarr, M A. Donmez, Anne-Fran?oise Obaton
A methodology to determine probability of detection (POD) of X-ray Computed Tomography (XCT) was developed using Additive Manufacturing defects. A signal
Automatic through Autonomous - Unmanned Ground Vehicles (A-UGVs), as termed by ASTM F45 for driverless industrial vehicles, have much potential for use in
Juan F. Fung, Jennifer F. Helgeson, Cheyney M. O'Fallon, David H. Webb, Harvey Cutler
Cedar Rapids, Iowa offers a unique case study in planning for increased resilience. In 2008, Cedar Rapids experienced severe flooding. Rather than simply
Patrick S. Crawford, Judith Mitrani-Reiser, Andrew Graettinger
Post-disaster studies are critical for measuring impact to communities, from physical infrastructure performance and vulnerabilities, to interdependencies with
Daniel C. Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
Group key-exchange protocols allow a set of N parties to agree on a shared, secret key by communicating over a public network. A number of solutions to this
Dipendra Jha, Aaron Gilad Kusne, Ankit Agrawal, Alok Choudhary, Reda Al-Bahrani, Nam Nguyen, Wei-keng Liao
X-ray diffraction (XRD) is a well-known technique used by scientists and engineers to determine the atomic-scale structures to understand the composition
David Michelson, Camillo Gentile, Nada T. Golmie, Jeanne Quimby, Kate Remley, Ken Gracie, Yvo de Jong
Wireless channel models play a critical role at all stages of the product life cycle, from standards development to network deployment. However, the distinctive
Miao (Tony) He, Jungmin Park, Adib Nahiyan, Apostol Vassilev, Yier Jin, Mark Tehranipoor
Power side-channel attacks (SCAs) have become a major concern to the security community due to their non- invasive feature, low-cost, and effectiveness in
The presentation will discuss the application of refrigerants starting from the beginnings of ‘artificial cold' in the era of industrial revolution to the
Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu
Exposure of sensitive information can be harmful on its own and in addition could enable further attacks. A rigorous and unambiguous definition of information
Aric Sanders, John Bass, Arpita Bhutani, Mary A. Ho, Jim Booth
Advances in artificial intelligence, or more specifically machine learning, have made it possible for computers to recognize patterns as well or better than
Fire is one of the significant contributors to the overall risk of core damage at a nuclear power plant (NPP). Potential sources of fire include permanent plant
Peter B. Papazian, Derek Caudill, Camillo Gentile, Jack Chuang, Nada T. Golmie
The paper describes implementation of phased array antennas for use in a wideband channel sounding system. The antennas are 62.5 GHz prototypes, utilizing SiGe
The economic and convenience benefits of interconnectivity drive the current explosive growth in networked systems. However, as recent catastrophic contagious
P. Yvonne Barnes, David W. Allen, Benjamin K. Tsai
The optical properties of human skin have been of interest to researchers for some time. Their interest is based on a need to know for a variety of different