NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Anmol Bhardwaj, Jack Chuang, Camillo Gentile, Chiehping Lai
A wireless channel is wide-sense stationary (WSS) when the mean and autocorrelation of its small-scale fading are displacement invariant. This occurs when the channel is rich in propagation paths – their complex summation averages out any displacement
Tao Zhang, Jialin Wan, Sen Lin, Zhaofeng Zhang, Junshan Zhang
5G and Beyond (B5G) technology promises to offer ultra-reliable low-latency communications (URLLC) services, which opens the door for a wide variety of new real-time applications. Real-time traffic has stringent requirements in terms of latency, and low
In this paper, we present a ray tracing (RT) assisted multipath cluster association method. This work is based on an indoor channel measurement at 60 GHz, where a light detection and ranging (LiDAR) sensor was co-located with channel sounder and time
Anouar Rahmouni, Paulina Kuo, Yicheng Shi, Jabir Marakkarakath Vadakkepurayil, Nijil Lal Cheriya Koyyottummal, Ivan Burenkov, Ya-Shian Li-Baboud, Mheni Merzouki, Abdella Battou, Sergey Polyakov, Oliver T. Slattery, Thomas Gerrits
We successfully demonstrated polarization entanglement distribution and classical time synchronization using a high-accuracy precision time protocol between two quantum nodes located 250 meters apart using a single fiber simultaneously carrying both
Wayne McKenzie, Ya-Shian Li-Baboud, Mark Morris, Gerald Baumgartner, Anouar Rahmouni, Paulina Kuo, Oliver T. Slattery, Bruce Crabill, Mheni Merzouki, Abdella Battou, Thomas Gerrits
We show sub-200 ps synchronization between quantum networks nodes that are separated by two 64 km deployed fiber links, providing a 128 km link architecture. The architecture employs one grandmaster and two boundary White Rabbit system clocks and shows
In recent work, we proposed sweeping the antennas of phased arrays and beamforming in postprocessing – what we coined switched beamforming – instead of sweeping beams through analog beamforming – what the arrays are designed for. Not only is it orders of
Unobstructed communication between Software Defined Networks (SDN) switches and the controller is vital for SDN's normal operation. We find from measurements, however, that the software control agents on some of the switches have very limited throughput
Zineb Maasaoui, Anfal Hathah, Hasnae Bilil, Van Sy Mai, Abdella Battou, ahmed lbath, Veton KEPUSKA
Real-time traffic management and control have become necessary in today's networks due to their complexity and cybersecurity risks. With the increase in internet use, threats are more present and require real-time detection and analysis to prevent
The millimeter-wave (mmWave) channel is often assumed to be sparse due to significant diffraction losses compared to microwave bands resulting in fewer paths reaching the receiver. While the sparsity property has been used in a significant amount of
Anouar Rahmouni, Samprity Saha, Oliver T. Slattery, Thomas Gerrits
Optical time-domain reflectometry (OTDR) is one of the most used techniques for nondestructive characterization of optical fiber links. Although conventional OTDR exhibits good performance in classical network applications, photoncounting OTDR (ν-OTDR)
NIST Special Publication 800-207 defines zero trust is a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to network identities, endpoints, and data flows. Input and cooperation from
Malware like botnets typically uses domain generation algorithms (DGAs) to dynamically produce a large number of random algorithmically generated domains (AGDs) and use a few of them to communicate with the command and control servers. AGD detection
A comprehensive evaluation of supervised machine learning models for the COVID-19 related domain name detection is presented. One representative conventional machine learning implementation and nineteen state-of-the-art deep learning implementations are
Mobile edge computing (MEC) integrates computing resources in wireless access networks to process computational tasks in close proximity to mobile users with low latency. This paper investigates the task assignment problem for cooperative MEC networks in
Damla Guven, Ben Jamroz, Jack Chuang, Camillo Gentile, Rob Horansky, Kate Remley, Dylan Williams, Jeanne Quimby, Rod Leonhardt
Millimeter-wave (mmWave) communications promise Gigabits-per-second data rates thanks to the availability of large swaths of bandwidth between 10–100 GHz. Although cellular operators prefer the lower portions of the bands due to the general belief that
Steve Blandino, Jelena Senic, Camillo Gentile, Derek Caudill
Beamforming training refers to the exhaustive scan over which the receiver and transmitter beams are steered along a predefined set of angles to determine the beam pairs that coincide with the dominant channel paths, for spatial multiplexing. In the
Potorti et. al. wrote a paper [1] that was dubbed as the first critical reading of the international standard ISO/IEC 18305 [2], Test and evaluation of localization and tracking systems. The author of this paper served as the Editor of ISO/IEC 18305. As
Wesley Garey, Thomas Henderson, Yishen Sun, Richard A. Rouil, Samantha Gamboa Quintiliani
To support the advancement of public safety communications technology, the Third Generation Partnership Project (3GPP) has created several standards to define Mission Critical Push-To-Talk (MCPTT) over Long Term Evolution (LTE) networks. As this is a new
Currently, the electricity demand is exponentially increasing due to the population growth. Therefore, the demand side management (DSM) is becoming unavoidable especially with the increasing use of renewable energy sources. One of the most known tactics of
Siham Khoussi, Lotfi Benmohamed, Abdella Battou, Junxiao Shi, James J. Filliben, Saddek Bensalem, Ayoub Nouri
Named Data Networking (NDN) is an emerging technology for a future Internet architecture that addresses weaknesses of the Internet Protocol (IP). Since Internet users and applications have demonstrated an ever-increasing need for high speed packet
Mariella Sarestoniemi, Carlos Pomalaza Raez, Kamran Sayrafian, Jari Iinatti
This paper presents the results of an in-body propagation study for abdominal implant communication using a bio-matched mini-horn antenna. The wireless signal coverage in the abdomen area at various ISM and UWB frequency bands are measured using
Future advances in deep learning and its impact on the development of artificial intelligence (AI) in all fields depends heavily on data size and computational power. Sacrificing massive computing resources in exchange for better precision rates of the
Resource and performance dependent blocking mechanisms for entanglement routing in quantum networks are identified and characterized in simulations of a DLCZ architecture under different loss and resource availability conditions.
One of the biggest problems facing future mobile systems beyond 5G (B5G) is the energy dissipation of mobile devices at high data rates. The heat generated by these devices can impact the performance as a result of a new type of outage called power