An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Shelly Bagchi, Murat Aksu, Megan L. Zimmerman, Jeremy Marvel, Brian Antonishek
Verified and validated test methods, being necessary to measure the performance of complex systems, are important tools for driving innovation, benchmarking and...
Jennifer L. Cawthra, Sue S. Wang, Bronwyn J. Hodges, Kangmin Zheng, Ryan T. Williams, Jason J. Kuruvilla, Christopher L. Peloquin, Kevin Littlefield, Bob Neimeyer
Medical imaging plays an important role in diagnosing and treating patients. The system that manages medical images is known as the picture archiving...
John M. Butler, Hariharan K. Iyer, Richard A. Press, Melissa Taylor, Peter Vallone, Sheila Willis
The National Institute of Standards and Technology (NIST) is a scientific research agency that works to advance measurement science, standards, and technology...
This paper explores a low-cost method to bridge analog public safety Land mobile radio (LMR) systems into a standards based Long Term Evolution (LTE) MCPTT...
This user guide describes an integrated set of C++ software tools for manipulating XML (eXtensible Markup Language) schemas and XML instance files. The tools...
Robert D. Byers, David A. Waltermire, Christopher A. Turner
The purpose of this document is to leverage the strength of technical knowledge provided by the Common Vulnerabilities and Exposures (CVE) Numbering Authorities...
Alexander Maranghides, William Mell, Steven Hawks, Mike Wilson, Will Brewer, Eric D. Link, Christopher U. Brown, Cartier P. Murrill, Erin Ashley
The Camp Fire started in the vicinity of Pulga Rd and Camp Creek Road, in Butte County on November 8 at 6:29 am. The cause of ignition is under investigation...
Matthew S. Hoehler, Matthew F. Bundy, Laurean A. DeLauter, Robin L. Materese, Leon Gerskovic, Jose R. Garcia
These experiments were designed to examine the difference in fire hazard between a dry Christmas tree and a watered Christmas tree for fire safety awareness...
This publication provides security and privacy control baselines for the Federal Government. There are three security control baselines (one for each system...
Mauro Zammarano, Matthew S. Hoehler, John R. Shields, Andre L. Thompson, Ickchan Kim, Isaac T. Leventon, Matthew F. Bundy
In this work, we investigated fire growth in a furnished compartment intended to mimic a living room where a couch was the main fuel load. Three TB-117-2013...
This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets...
The software, used to process raw data coming from a residential air-conditioner or heat pump that is operating in the cooling mode, is described. The code was...
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms...
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database...
The purpose of this research is to investigate how thermal comfort dynamics are impacted by energy-efficient or thermal comfort improvements in a low-load house...
Simulation and optimization methods are needed to design and operate large-scale, complex systems. Integrating the two presents a number of conceptual and...
Chelsea Greene, Jesse Frey, Zainab O. Soetan, Jaden Pieper, Silas Thompson
Access time generally describes the time associated with the establishment of a talk path upon user request to speak and has been identified as a key component...
This is the second of a series of reports on the performance of face recognition algorithms on faces occluded by protective face masks commonly worn to reduce...
Yannic Ramaye, Vikram Kestens, J. Charoud-Got, S. Mazoua, G. Auclair, Tae Joon Cho, Blaza Toman, Vincent A. Hackley, T. Linsinger
This report describes the production of SRM 1992/ERM-FD305, silica particles suspended in a borate buffer, certified for electrophoretic mobility and zeta...
Yannic Ramaye, Vikram Kestens, J. Charoud-Got, S. Mazoua, G. Auclair, Tae Joon Cho, Blaza Toman, Vincent A. Hackley, T. Linsinger
This report describes the production of SRM 1993/ERM-FD306, silica particles suspended in a borate buffer, certified for electrophoretic mobility and zeta...
Additive manufacturing (AM) with cement-based materials is an emerging technology that has the potential to revolutionize concrete construction. The placement...
The USGv6 Capabilities Table (UCT) provides a concise tabular summary of the technical requirements of the USGv6 profile. For ease of reference, the UCT is...
The NISTv6 Capabilities Table (NCT) provides a concise tabular summary of the technical requirements of the NISTv6 profile. For ease of reference, the NCT is...
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document defines the scope of accreditation for the USGv6 Test program, including test method validation procedures, laboratory accreditation process and...
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document outlines the form and function of the USGv6 Test Program. In particular, it defines the components of the test program, their implementation and...
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common...
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common...
The USGv6 Profile SDoC captures the results of conformance, interoperability and functional tests conducted and provides traceability back to the accredited...