Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

IREX V: Guidance for Iris Image Collection

Author(s)
George W. Quinn, JAmes Matey, Elham Tabassi, Patrick J. Grother
This document provides guidance for the proper collection of iris images. Problems that occur during image acquisition can lead to poor quality samples. If the...

ITL Forensic Science Program

Author(s)
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and...

Overview of the TREC-2012 Microblog Track

Author(s)
Ian M. Soboroff, Iadh Ounis, Jimmy Lin, Craig Macdonald
The Microblog track examines search tasks and evaluation meth- odologies for information seeking behaviours in microblogging en- vironments such as Twitter. It...

1588 Power Profile Test Plan:

Author(s)
Carol Perkins, Jeff Laird, Ryan McEachern, Bob Noseworthy, Julien Amelot, Ya-Shian Li-Baboud, Kevin Brady

Identifying Face Quality and Factor Measures for Video

Author(s)
Yooyoung Lee, P. Jonathon Phillips, James Filliben, J. R. Beveridge, Hao Zhang
This paper identifies important factors for face recognition algorithm performance in video. The goal of this study is to understand key factors that affect...

LTE Physical Layer Performance Analysis

Author(s)
Wen-Bin Yang, Michael R. Souryal
In this report, we present results of a physical layer performance study for all MCSs (from MCS0 to MCS28) in terms of block error rate (BLER) and spectral...

Guidelines on Mobile Device Forensics

Author(s)
Richard Ayers, Sam Brothers, Wayne Jansen
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile...
Was this page helpful?