An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In this study, environmentally stressed OS fabrics containing melamine fiber blends were evaluated for thermal and mechanical properties that are critical to...
Joshua Lubell, Kenway K. Chen, John A. Horst, Simon P. Frechette, Paul J. Huang
This report summarizes the presentations, discussions and recommendations of a workshop held at the National Institute of Standards and Technology in December...
This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the...
Paul R. Cichonski, Thomas Millar, Timothy Grance, Karen Scarfone
Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only...
Shahram Orandi, John M. Libert, John D. Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu, Lindsay M. Petersen, Bruce Bandini
This paper presents the findings of a study initially conducted to measure the operational impact of JPEG 2000 lossy compression on 1000 ppi fingerprint imagery...
This report investigates the current state-of-the-art methods for determining the properties of metal powders. This assessment evaluates both existing standards...
Each year, billions of dollars of vaccines are stored in refrigerators at the facilities of a variety of medical providers. Many vaccines must be maintained in...
Stacy S. Schuur, Paul R. Becker, Sylvain Berail, Russell D. Day, Olivier F. Donard, Keith A. Hobson, Amanda J. Moors, Rebecca S. Pugh, Lauren B. Rust, David G. Roseneau
Since 1999, the Seabird Tissue Archival and Monitoring Project (STAMP) has collected, banked, and analyzed seabird eggs using established protocols to monitor...
Stacy S. Vander Pol, Paul R. Becker, Sylvain Berail, Rusty D. Day, Olivier F.X. Donard, Keith A. Hobson, Amanda J. Moors, Rebecca S. Pugh, Lauren B. Rust, David G. Roseneau
William R. Kelly, Bruce S. MacDonald, John L. Molloy, Stefan D. Leigh, Andrew L. Rukhin
A procedure is presented whereby the fossil fuel community may design and mix SRMs in different proportions and thereby produce in their laboratory fossil fuel...
Small specimen test techniques are becoming more and more popular as the need increases to characterize mechanical properties using the smallest possible amount...
Archita Hati, Craig W. Nelson, Neil Ashby, David A. Howe
NIST provides an on-site calibration service of the accuracy of phase modulation (PM) noise, amplitude modulation (AM) noise and noise floor of the measurement...
Richard D. Peacock, Thomas G. Cleary, Paul A. Reneke, Daniel Murphy
A review is presented of the state of the art of smoke production measurement, prediction of smoke impact as part of computer-based fire modeling, and...
Jin Chu Wu, Michael W. Halter, Raghu N. Kacker, John T. Elliott
Cell image segmentation (CIS) is critical for quantitative imaging in cytometric analyses. The data derived after segmentation can be used to infer cellular...
Allan W. Smith, Steven R. Lorentz, Raju V. Datla, Thomas C. Stone
The need to understand and monitor climate change has led to proposed radiometric accuracy requirements for space-based remote-sensing instruments that are very...
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of...
To support natural resource damage assessment (NRDA) in response to the Deepwater Horizon (DWH) oil spill in the Gulf of Mexico, a large number of samples were...
Verifying correctness of stated facts, rules, and term definitions for an industrial domain of work requires the contributions of experts in the domain...
The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional...
As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the...
Marc J. Assael, I.A. Koini, K.D. Antoniadis, Marcia L. Huber, Ilmutdin M. Abdulagatov, Richard A. Perkins
This paper contains new, representative reference equations for the thermal conductivity of SF6. The equations are based in part upon a body of experimental...