NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Several NGP projects studied the mechanisms of chemical suppressants, including those containing halogens, phosphorus, and metals. From the work, several
The flow inside an engine nacelle ground test simulator is studied for the purpose of understanding and optimizing the distribution of suppressant. One
A review of the history of fire suppression on U.S. Department of Defense (DoD) aircraft is presented to provide a context against which the findings of the
Michael T. Postek, Joseph J. Kopanski, David A. Wollman
This document includes a list of selected NIST accomplishments in nanotechnology for the period of fiscal years 2004 and 2005. These accomplishments are grouped
This NIST Internal Report deals with Release 2.0 of a software package, Forensic Software Testing Support Tools (FS-TST 2.0), developed to aid the testing of
This document provides guidelines for establishing the requirements and mechanisms for the exchange of facilities information among parties, from project
Eswaran Subrahmanian, Sudarsan Rachuri, A Bouras, Steven J. Fenves, Sebti Foufou, Ram D. Sriram
A major challenge of any product engineering project is to support the creation, exchange, management and archival of information about product, process, people
This bulletin provides information about "malware," a term used to describe malicious code and malicious software that are covertly inserted into an information
David E. Gilsinn, Geraldine S. Cheok, Christoph J. Witzgall, Alan M. Lytle
Laser Scanning devices (LADAR for Laser Detection and Ranging) are used in construction projects to capture as-built data. They can rapidly generate large
[Withdrawn (February 12, 2018)]This guide is intended to provide manufacturers, packers, distributors, and retailers of packaged products with information about
The APEX method is a non-iterative, single frame, direct blind deconvolution technique that can sharpen certain kinds of high resolution images in quasi real