An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
James P. Randa, Janne Lahtinen, Adriano Camps, A. Gasiewski, Martti Hallikainen, David Leine V, Manuel Martin-Neira, Jeff Piepmeier, Philip Rosenkranz, Christopher Ruf, James Shiue, Niels Skou
We present recommended definitions for common terms in microwave remote-sensing radiometry. Terms are grouped into three chapters: General Terminology, Real
Chriss A. Grosvenor, David R. Novotny, Dennis G. Camell, Galen H. Koepke, Robert Johnk
The National Institute of Standards and Technology has recently completed shielding effectiveness/penetration studies on three different aircraft types for the
Christopher L. Holloway, William F. Young, Galen H. Koepke, Catherine A. Remley, Dennis G. Camell, Yann Becquet
In this report, we investigate radio communication problems faced by emergency responders (firefighters, police and emergency medical personnel) in disaster
Developing a cost-effective risk mitigation plan involves assessing the risks associated with natural and man-made hazards, formulating combinations of
Gaurav Ameta, Sudarsan Rachuri, Xenia Fiorentini, Mahesh Mani, Steven J. Fenves, Kevin W. Lyons, Ram D. Sriram
In this paper we intend to demonstrate the need for extending the notion of quality from the physical domain to information and, more comprehensively, to
Karen A. Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11
The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security
Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or
Michael Gaitan, Jayna J. Shah, Darwin Reyes-Hernandez, Pierre-Alain Auroux, Jon Geist, Laurie E. Locascio, Wyatt N. Vreeland, David J. Ross, Peter Vallone, Paul Smith, Nicole Morgan, Tom Pohida, John Kakareka, Annelise Barron
This report summarizes the NIST effort on microfluidic DNA analysis systems for forensic applications sponsored by the National Institute of Justice. Currently
Although the construction industry is a major component of the U.S. economy, it has experienced a prolonged period of decline in productivity. Due to the
Elizabeth Chew, Marianne M. Swanson, Kevin M. Stine, N Bartol, Anthony Brown, W Robinson
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and
National Institute of Standards and Technology (NIST), Quynh Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be
1. Table 9-db - Pages db-92.0 through db-92.9: New table for fluorine containing the density for the real fluid at selected temperatures and pressures. 2. Table
Sheila E. Frankel, Paul Hoffman, Angela Orebaugh, Richard Park
Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or
A series of experiments was run in a masonry educational building examining the ability of fire service Positive Pressure Ventilation (PPV) fans to limit smoke
Francine K. Amon, Nelson P. Bryner, Andrew J. Lock, Anthony P. Hamins
Thermal imaging cameras (TIC) are becoming an important tool for many firefighters and other first responders. However, due to the lack of performance standards
A series of experiments was run in a masonry educational building examining the ability of PPV fans to limit smoke spread or to remove smoke from desired areas
The first version of HVACSIM+, which stands for HVAC SIMulation PLUS other systems, as introduced by National Institute of Standards and Technology (NIST) in
John G. Hagedorn, Judith E. Terrill, Adele P. Peskin, James J. Filliben
We present methods for measuring errors in the rendering of three-dimensional points, line segments, and polygons in pixel-based computer graphics systems. We
Stephen Knight, Joaquin (. Martinez, Yaw S. Obeng, Michele L. Buckley
The microelectronics industry supplies vital components to the electronics industry and to the U.S. economy, enabling rapid improvements in productivity and in
This handbook, which can be used as both a tutorial and a reference, describes practical techniques for frequency stability analysis. It covers the definitions
Douglas C. Montgomery, J. S. Nightingale, Sheila E. Frankel, Mark E. Carson
This publication seeks to assist Federal agencies in formulating plans for the acquisition of IPv6 technologies. To achieve this, we define a standards profile
NIST Handbook 150-17 presents technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation
The Ontological Modeling Platform described in this paper is a class library for extended ontological operations, to support extension of ontology languages
The system of programs described in this paper is concerned with estimating the damage ensuing from exposure of specimens in dry and humid atmospheres to UV and
James S. Sims, John G. Hagedorn, Steven G. Satterfield, Terence J. Griffin, William L. George, Howard Hung, John T. Kelso, Thomas M. Olano, Adele P. Peskin, Judith E. Terrill, Garnett W. Bryant, Jose G. Diaz
This is the third in a series of articles that describe, through examples, how the Scientific Applications and Visualization Group (SAVG) at NIST has utilized
Chriss A. Grosvenor, David R. Novotny, Dennis G. Camell, Galen H. Koepke, Robert Johnk
The National Institute of Standards and Technology has recently completed shielding effectiveness/penetration studies on three different aircraft types for the