An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jun-Feng Song, Samuel R. Low III, Thomas B. Renegar, Li Ma
The ISO 6508-3-2005 standard specified a tight tolerance for the cone flank straightness of Rockwell diamond indenters (0.5 μm for maximum). In the recent...
Brandon M. Lane, Shawn P. Moylan, Eric P. Whitenton, Li Ma
Measurement of the high-temperature melt pool region in the laser powder bed fusion (L-PBF) process is a primary focus of researchers to further understand the...
Mihaela L. Vlasea, Brandon M. Lane, Felipe F. Lopez, Sergey Mekhontsev, M A. Donmez
Laser powder bed fusion (PBF) is emerging as the most popular additive manufacturing (AM) method for producing metallic components based on the flexibility in...
Arunima Singh, Albert Davydov, Kiran Mathew, Richard G. Hennig, Francesca M. Tavazza
Several 2D materials have been synthesized experimentally, but many theoretically predicted 2D materials are yet to be synthesized. Here, we will review a...
We demonstrate the simultaneous measurement of optical trap stiffness and quadrant-cell photodetector (QPD) calibration of optically trapped polystyrene...
The future of manufacturing lies in being able to adapt quickly to changing conditions. From smaller lot sizes, to more customization, to sudden changes in...
Mark O. McLinden, J. Steven Brown, Andrei F. Kazakov, Piotr A. Domanski
We explore the possibilities for low-GWP refrigerants through two approaches. First, we explore the performance of hypothetical refrigerants to define the...
Gregory P. Fiumara, Wayne J. Salamon, Craig I. Watson
With the proliferation of biometric-based identity management solutions, biometric algorithms need to be tested now more than ever. Independent biometric...
Piotr A. Domanski, Hugh Henderson, William V. Payne
The study analyzed the effect of common installation faults on the cooling performance of a residential, split air conditioner installed in a single-family...
We discuss a new method for the measurement of electric (E) fields that will lead to a self-calibrating, direct SI-traceable E-field probe. The technique is...
Ray R. Tanuhardja, Luis A. Gonzalez, Chih-Ming Wang, William F. Young, Kate Remley
This contribution discusses the use of a metric based on the amplitude variation of a channel in the signal bandwidth to predict whether or not a digital...
A Body Area Network (BAN) is a radio standard for wireless connectivity of wearable and implantable sensors located inside or in close proximity to the human...
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn, Raghu N. Kacker, Yu Lei
Attribute Based Access Control (ABAC) is a popular approach to enterprise-wide access control that provides flexibility suitable for today's dynamic distributed...
As the number of users of additive manufacturing (AM) steadily increases, and considering their demand for material and process specifications, the need for...
Large amounts of data are generated, exchanged, and used during an additive manufacturing (AM) build. While the AM data from a single build is essential for...
Gaurav Ameta, Robert R. Lipman, Paul W. Witherell, Shawn P. Moylan
Additive manufacturing (AM) has gained increased attention in the last decade as a versatile manufacturing process for customized products. AM process can...
Nanostructured, responsive hydrogels composed of oppositely charged triblock copolymers with charged end-blocks and neutral, hydrophilic mid-blocks in aqueous...
Mathematical Information Retrieval concerns retrieving information related to a particular mathematical concept. The NTCIR-11 Math Task develops an evaluation...
This work demonstrates how a modular transmission detector can be used to extend the analytical capabilities of a conventional SEM. By implementing a new sample...
Paul Moulema, Wei Yu, David W. Griffith, Nada T. Golmie
The smart grid is a complex system that comprises components from both the power grid and communication networks. To understand the behavior of such a complex...
Password management is the ubiquitous struggle of the modern human. Despite usability playing a vital role in authentication, many password policies and...
The current work examines subjective password usability across platformsdesktop, smartphone, and tabletusing system- generated passwords that adhere to the...
We study the relationship between two measures of Boolean functions; "algebraic thickness" and "normality". For a function f, the algebraic thickness is a...
The digital thread for cybersecurity enables security technologies and data sources to interoperate. It consists of an integrated collection of languages...
Rule-based expert systems such as CLIPS (C Language Integrated Production System) are 1) based on inductive (if-then) rules to elicit domain knowledge and 2)...
Chiara Villani, Catherine Lucero, Dale P. Bentz, Daniel S. Hussey, David L. Jacobson, Jason Weiss
Shrinkage Reducing Admixtures (SRAs) are increasingly being used in concrete as a method to minimize shrinkage and restrained shrinkage cracking. SRAs reduce...
Garretson Ian C. , Kevin W. Lyons, Mahesh Mani, Swee K. Leong, Matthew Carter D. , Ann Simmons E. , Karl Haapala R.
Industrial uses of natural resources are increasing at an alarming rate. Engineering and decision support tools are needed for analyzing and curbing industrial...
Brian C. Stanton, Mary F. Theofanos, Karun P. Joshi
Organizations are increasingly adopting cloud-based services to meet their business needs. However, due to the complexity and diversity of cloud systems it is...
Aric W. Sanders, Kavita M. Jeerage, Ann C. Chiaramonti Debay, Alexandra Curtin
Gold nanoparticles (GNPs) are gaining importance as therapeutic chemical delivery vehicles, medical diagnostic tools, phototherapeutic and contrast enhancement...
Organizations establish policies on how employees should generate, maintain, and use passwords to authenticate and gain access to the organizations information...