An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Researches have shown that design changes cost more in later stages of product development. Therefore, companies adopt Design-for-X methods to optimize product...
Fog computing is an emerging architecture, which extends the Cloud computing paradigm to the edge of the network, enabling new applications and services...
Jack F. Douglas, Beatriz Betancourt, Fernando Vargas-Lara, Francis W. Starr, Wengang Zhang
We perform coarse-grained simulations of model nanoparticles having a diameter on the order of 10 nm in an unentangled polymer matrix in the limit of low...
Matthew T. Simons, Abdulaziz H. Haddab, Joshua A. Gordon, Christopher L. Holloway
We discuss several recent extensions of quantum radio frequency (RF) electric field sensors to antenna/receiver applications. These Rydberg atom-based sensors...
Efficient circuits for multiplication of binary polynomials use what are known as Karatsuba recurrences. These methods divide the polynomials of size kn into k...
Anouk Hubrechsen, Laurens A. Bronckers, Kate Remley, Rob Jones, Rob Horansky, Ad Reniers, Anne Roc'h, Bart Smolders
Measuring wireless devices in a reverberation chamber often requires ancillary equipment to be present in the chamber. This paper illustrates the effect of...
Muhammad Adnan, Yan Lu, Albert T. Jones, Fan Tien Cheng
Monitoring and controlling Additive Manufacturing (AM) processes play a critical role in enabling the production of quality parts. Different from the...
We introduce a new classification task for scientific statements and release a large-scale dataset for supervised learning. Our resource is derived from a...
Timothy A. Sprock, Michael E. Sharp, William Z. Bernstein, Michael P. Brundage, Moneer M. Helu, Thomas D. Hedberg Jr.
In traditional manufacturing operations management systems, the four pillars of ISA-95 (production, quality, maintenance, inventory) are each implemented as...
William Z. Bernstein, Sylvere Krima, Laetitia Monnier, Mehdi Shahid
We introduce a prototype implementation of the Securing and Authenticating Data-Links (SADL) Interface, which interacts with a manufacturing handle registry to...
This paper presents a vision-based 6 degree of freedom (DOF) measurement system that can measure robot dynamic motions in real-time. A motorized target is...
As the refrigeration industry moves towards low-GWP refrigerants the number of acceptable refrigerants is decreasing due to new environmental constraints, but...
Human- or expert-generated records that describe the behavior of engineered systems over a period of time can be useful for statistical learning techniques like...
Dimitris Simos, Bernhard Garn, Ludwig Kampel, D. Richard Kuhn, Raghu N. Kacker
We present a combinatorial coverage measurement analysis for test vectors provided by the NIST Cryptographic Algorithm Validation Program (CAVP), and in...
Several ontologies have been introduced in the domain of supply chain over the past decade with the promise of enabling a true supply chain interoperability...
Max K. Ferguson, Seongwoon Jeong, Kincho H. Law, Anantha Narayanan Narayanan, Svetlana Levitan, Jena Tridivesh, Yung-Tsun Lee
The use of deep convolutional neural networks is becoming increasingly popular in the engineering and manufacturing sectors. However, managing the distribution...
Saadia A. Razvi, Shaw C. Feng, Anantha Narayanan Narayanan, Yung-Tsun Lee, Paul Witherell
Variability in product quality continues to pose a major barrier to the widespread application of additive manufacturing (AM) processes in production...
As a widely used additive manufacturing (AM) technology to produce metallic parts, powder bed fusion (PBF) is driven by a moving heat source. Thermal simulation...
Vladimir Marbukh, Kamran Sayrafian, Behnam Rouzbehani, Luis Correia
This paper proposes an approach to cross-layer optimization of virtualized Radio Access Network resources in future mobile communications. Assuming that the...
Julie Haney, Susanne M. Furman, Mary Theofanos, Yasemin Acar Fahl
Smart home devices are increasingly being used by nontechnical users who have little understanding of the technology, including privacy and security...
The Security Content Automation Protocol (SCAP) schema for source data stream collections standardizes the requirements for packaging Extensible Markup Language...
We implement a cascaded interface connecting three essential frequencies for quantum communications including 1540-nm for long-distance transmission, 895-nm for...
Hardware/Server virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to...
Yi Bao, Matthew Hoehler, Christopher M. Smith, Matthew Bundy, Genda Chen
This study investigates temperature distributions in steel-concrete composite slabs subjected to fire using distributed fiber optic sensors. Several 1.2 m x 0.9...
Vladimir P. Oleshko, William R. McGehee, Saya Takeuchi, Siyuan Zhang, Andrei A. Kolmakov, Jabez J. McClelland, Christopher L. Soles
Lithium-sulfur (Li-S) batteries have recently attracted enormous attention because of high theoretical specific energy (2600 Wh kg-1) and high specific capacity...
The Information Technology Lab at NIST is developing technical standards for documentation related to systems security. The Open Security Controls Assessment...