An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
From a traditional point of view, the value of information does not change during transmission. The Shannon information theory considers information transmission as a statistical phenomenon for measuring the communication channel capacity. However, in
Jeffrey T. Fong, N. Alan Heckert, James Filliben, Pedro V. Marcal, Samuel Berweger, Thomas Mitchell (Mitch) Wallis, Pavel Kabos
To calibrate near-field scanning microwave microscopes (NSMM) for defect detection and characterization in semiconductors, it is common to develop a parametric finite element analysis (FEA) code to guide the microscope user on how to optimize the settings
Jeffrey T. Fong, Pedro V. Marcal, Robert B. Rainsberger, Nathanael A. Heckert, James J. Filliben
When a small crack is detected in a pressure vessel or piping, we can estimate the fatigue life of the vessel or piping by applying the classical law of fracture mechanics for crack growth if we are certain that the crack growth exponent is correct and the
Michael P. Majurski, Petru S. Manescu, Sarala Padi, Nicholas J. Schaub, Nathan A. Hotaling, Carl Simon Jr., Peter Bajcsy
We address the problem of segmenting cell contours from microscopy images of human induced pluripotent Retinal Pigment Epithelial stem cells (iRPE) using Convolutional Neural Networks (CNN). Our goal is to compare the accuracy gains of CNN-based
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). Part I (Overview) provides a high-level overview of the
Justin A. Kauffman, William L. George, Jonathan S. Pitt
Fluid-structure interaction simulations where solid bodies undergo large deformations require special handling of the mesh motion for Arbitrarily Lagrangian-Eulerian (ALE) formulations. Such formulations are necessary when body-fitted meshes with certain
Jeffrey T. Fong, James J. Filliben, Nathanael A. Heckert, Dennis D. Leber, Paul A. Berkman, Robert E. Chapman
Risk, as the product of failure probability and failure consequence, has been estimated and applied by engineers and managers to help make critical decisions on (a) maintenance of ageing plants, and (b) planning of new infrastructure. For ageing plants
Joshua A. Gordon, David R. Novotny, Michael S. Allman
We present on an all-optical spatial metrology system, the PiCMM, that aids in the alignment and tracking of antennas with accuracies on the order of 25 microns and 0.01 deg. This system speeds up millimeter-wave antenna alignment, does not require contact
Nina P. Basta, Aaron Hagerstrom, Jasper A. Drisko, James Booth, Edward Garboczi, Christian Long, Nathan Orloff
— Electrical properties of materials are a necessary part of any circuit design. With emerging applications at millimeter- wave frequencies, there is a need to characterize new materials before they come to market. At frequencies below about 67 GHz, it is
Howard S. Cohl, Andre Greiner Petter, Moritz Schubotz, Bela Gipp
Mathematical formulae carry complex and essential semantic in- formation in a variety of formats. Accessing this information with different sys- tems requires a standardized machine-readable format that is capable of encod- ing presentational and semantic
Jeffrey T. Fong, Nathanael A. Heckert, James J. Filliben, Steven R. Doctor
The ASME Boiler & Pressure Vessel Code Section XI Committee is currently developing a new Division 2 nuclear code entitled the "Reliability and Integrity Management (RIM) program," with which one is able to arrive at a risk-informed, NDE-based engineering
Jeffrey T. Fong, Pedro V. Marcal, Robert B. Rainsberger, Li Ma, Nathanael A. Heckert, James J. Filliben
Errors and uncertainties in finite element method (FEM) computing can come from the following eight sources: (1) Computing platform; (2) choice of element types; (3) choice of mean element density or degrees of freedom (d.o.f.); (4) choice of a percent
Minimizing the Boolean circuit implementation of a given cryptographic function is an important issue. A number of papers only consider cancellation-free straight-line programs for producing short circuits over GF(2). The Boyar-Peralta (BP) heuristic
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). Part I (Overview) provides a high-level overview of the
Jeffrey T. Fong, Nathanael A. Heckert, James J. Filliben, Marvin J. Cohn
Uncertainty in modeling the creep rupture life of a full-scale component using experimental data at microscopic (Level 1), specimen (Level 2), and full-size (Level 3) scales, is addressed by applying statistical theory of prediction intervals, and that of
Matthew Zambrello, Adam D. Schuyler, Mark W. Maciejewski, Frank Delaglio, Irina Bezsonova, Jeffrey C. Hoch
The development of multidimensional NMR spectroscopy enabled an explosion of structural and dynamical investigations on proteins and other biomacromolecules. Practical limitations on data sampling, based on the Jeener paradigm of parametric sampling of
Mark W. Maciejewski, Hesam Dashti, Matthew Zambrello, Adam D. Schuyler, Mehdi Mobli, Hamid R. Eghbalnia, Frank Delaglio, Alan S. Stern, Jeffrey C. Hoch
The development of multidimensional NMR spectroscopy enabled an explosion of structural and dynamical investigations on proteins and other biomacromolecules. Practical limitations on data sampling, based on the Jeener paradigm of parametric sampling of
We recently developed a surface integral equation method where the electric field and its normal derivative are chosen as the boundary unknowns. After reviewing this formulation, we present preliminary numerical calculations that show good agreement with
We present techniques to obtain small circuits which also have low depth. The techniques apply to typical cryptographic functions, as these are often specified over the field GF(2), and they produce circuits containing only AND, XOR and XNOR gates. The
Timothy J. Blattner, Jiahao Wu, Walid Keyrouz, Shuvra S. Bhattacharyya
Design and implementation of smart vision systems often involve the mapping of complex image processing algorithms into efficient, real-time implementations on multicore platforms. In this paper, we describe a novel design tool that is developed to address
Jeffrey T. Fong, Nathanael A. Heckert, James J. Filliben, Stephen W. Freiman
Uncertainty in modeling the fatigue life of a full-scale component using experimental data at microscopic (Level 1), specimen (Level 2), and full-size (Level 3) scales, is addressed by applying statistical theory of prediction intervals, and that of
A major challenge for future wide area measurement systems is how to efficiently monitor and control the power system, which requires accurate and real-time tracking of the phase, frequency, and Power Factor (PF) of the system. The presence of inter and
Stephen P. Jordan, Jacob Bringewatt, Alan Mink, William Dorland
Most research regarding quantum adiabatic optimization has focused on stoquastic Hamiltonians, whose ground states can be expressed with only real, nonnegative amplitudes. This raises the question of whether classical Monte Carlo algorithms can efficiently
This book looks at the increasing interest in running microscopy processing algorithms on big image data by presenting the theoretical and architectural underpinnings of a web image processing pipeline (WIPP). Software-based methods and infrastructure