An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The NIST Virtual Museum is an online repository of information related to the U.S. National Institute of Standards and Technology. It is intended for a general
Jacob Rabinow holds 230 U.S. patents on a variety of mechanical and electrical devices. Among these are the automatic letter-sorting machine used by the U.S
Justin Zook, John G. Cleary, Len Trigg, Francisco De La Vega
To evaluate and compare the performance of variant calling methods and confidence scores, comparisons between a test call set and a "gold standard" need to be
Stefano Carpin, Shuo Liu, Joseph Falco, Karl Van Wyk
Grasping and manipulation has generated significant interest in the robotics community, and robotic grasping emerged as an autonomous area of research since the
Moneer M. Helu, Thomas D. Hedberg, Allison Barnard Feeney, Mark E. Luce
Data is collected from the Manufacturing Lab using the MTConnect standard. That data is aggregated and published internally and externally of NIST via web
The assignment of the weight of DNA evidence depends on a number of factors (allele probability estimates, the population genetic model used, the value of the
Thomas D. Hedberg, Moneer M. Helu, Allison Barnard Feeney
Data is collected from the Manufacturing Lab using the MTConnect standard. That data is aggregated and published internally and externally of NIST via web
Piotr A. Domanski, David A. Yashar, Janusz Wojtusiak
EVAP-COND is a software package that contains NIST's simulation models for a finned-tube evaporator and condenser. The tube-by-tube modeling scheme allows for
Vinod K. Tewary, Rebecca C. Quardokus, Frank W. DelRio
A Green's function (GF) method is developed for interpreting scanning probe microscopy (SPM) measurements on new two-dimensional (2D) materials. GFs for the
This paper describes using CodeSynthesis "XSD" tool and Xerces C++ XML tools in basic Quality Information Framework (QIF) applications. The targeted platforms
This document details an automated approach to generating AS9102 reports from inspection material represented in Quality Information Framework XML. AS9102 is an
Christopher Reddy, Stephen Wise, Lane C. Sander, Jacolin Murray
Following an open meeting entitled, "Hydrocarbon Chemistry QA/QC," at the 2014 Gulf of Mexico Oil Spill and Ecosystem Science Conference in Mobile, Alabama, the
The Reclamation-NIST Exploratory Research Symposium was held on August 4-5, 2015, at the Reclamation Denver Federal Center facility in Lakewood, CO, and the
Hydrofluorocarbons (HFCs), which are commonly used as refrigerants in air-conditioning equipment, are potent greenhouse gases and will need to be replaced. In
Identify and assess capabilities needed to connect most elements of the internet of everything (IoE) and highlight technology needs and gaps. This includes
The NIST Office of Weights and Measures (OWM) over time have received a number of inquiries regarding the suitability, use, and testing of hopper-type scales
Magnus G. Find, Daniel C. Smith-Tone, Meltem Sonmez Turan
Multiplicative complexity is a complexity measure, which is defined as the minimum number of AND gates required to implement a given primitive by a circuit over
Experimental reproducibility is a cornerstone of the scientific method. The ease of achieving its counterpart in computing, numerical reproducibility, was one
We consider the unique issues related to software sustainability that accompany scientific codes that employ stochastic algorithms. These are codes that often
We consider the multiplicative complexity of Boolean functions with multiple bits of output, studying how large a multiplicative complexity is necessary and
Paul E. Black, Irena V. Bojanova, Yaacov Yesha, Yan Wu
High-confidence systems must not be vulnerable to attacks that reduce the security, reliability, or availability of the system as a whole. One collection of