Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 101 - 125 of 833

Quasi-deterministic Model for Doppler Spread in Millimeter-wave Commmunication Systems

May 18, 2017
Author(s)
Jian Wang, Camillo Gentile, Peter B. Papazian, Jae-Kark Choi, Jelena Senic
The most salient feature differentiating millimeter-wave communication systems from their predecessors will be the steerable pencilbeam antennas at the transceivers. As opposed to conventional widebeam antennas, only a few multipath components will be

Dynamic Appliances Scheduling in Collaborative MicroGrids System

May 1, 2017
Author(s)
Hamid Gharavi, Hasnae Bilil
Abstract—In this paper a new approach which is based on a collaborative system of MicroGrids (MG’s), is proposed to enable household appliance scheduling. To achieve this, appliances are categorized into flexible and non-flexible Deferrable Loads (DL’s)

Energy Efficiency Challenges of 5G Small Cell Networks

May 1, 2017
Author(s)
Hamid Gharavi
The deployment of a large number of small cells poses new challenges to energy efficiency, which has often been ignored in fifth generation (5G) cellular networks. While massive multiple-input multiple outputs (MIMO) will reduce the transmission power at

Synchrophasor Data Quality Attributes and a Methodology for Examining Data Quality Impacts upon Synchrophasor Applications

March 14, 2017
Author(s)
Dhananjay Anand, Allen R. Goldstein, Alison Silverstein, Laurie Miller, Francis Tuffner, Yuri Makarov
Data from synchrophasor devices like phasor measurement units (PMU) is increasingly being used to enhance and improve power grid operations, analysis, and planning applications. However, PMU data often arrive at the application with a variety of data

Space-Time Approach for Disturbance Detection and Classification

March 9, 2017
Author(s)
Hamid Gharavi
A major challenge facing future grid systems is to identify the source of abnormal behaviors caused by faults or voltage instability. In this paper Phasor Measurement Units (PMUs) have been considered for detecting disturbances and degradation in the grid

Email Authentication Mechanisms: DMARC, SPF and DKIM

February 16, 2017
Author(s)
J. S. Nightingale
In recent years the IETF has been making a range of efforts to secure the email infrastructure and its use. Infrastructure protection includes source authentication by RFC 7208 Sender Policy Framework (SPF), message integrity authentication by RFC 6376

The Emergence of DANE Trusted Email for Supply Chain Management

January 3, 2017
Author(s)
Scott Rose, Joseph Gersch, Daniel Massey
Supply chain management is critically dependent on trusted email with authentication systems that work on a global scale. Solutions to date have not adequately addressed the issues of email forgery, confidentiality, and sender authenticity. The IETF DANE

Using RTS/CTS to Enhance the Performance of IEEE 802.15.6 CSMA/CA

December 22, 2016
Author(s)
Kamran Sayrafian, Martina Barbi, Mehdi Alasti
IEEE 802.15.6 is a radio interface standard for a wireless connectivity of wearable and implantable sensors and actuators located inside or in close proximity to the human body i.e. Body Area Network (BAN). Medical applications requirements impose

Distributed Control and Communications for Grid Systems

December 5, 2016
Author(s)
Hamid Gharavi
A major problem of the grid system is identifying the source of abnormal behaviors. It is particularly important to identify the areas in which the grid system suffers from power deficiencies due to fault or voltage instability. Phasor Measurement Units

Pathloss Models for Indoor Hotspot Deployment at 83.5 GHz

December 3, 2016
Author(s)
Camillo Gentile, Jelena Senic, Peter B. Papazian, Jae-Kark Choi, Kate Remley
Conventional pathloss models are based on the received power from an omnidirectional antenna. Millimeter-wave receivers, conversely, will feature highly directional antennas that can be steered towards the angle with maximum power, exploiting their high

Making Email Trustworthy

October 24, 2016
Author(s)
Scott W. Rose, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-177: Trustworthy Email. This publication gives recommendations and guidelines for enhancing trust in email. This guideline applies to federal IT systems and will also be useful for any small

The Algebra of Systems and System Interactions with an application to Smart Grid

October 14, 2016
Author(s)
Charif Mahmoudi, Hasnae Bilil, Edward R. Griffor
Systems are integrations of devices or component elements and even other systems. The notion of a system comprehends engineered and biological or mechanical or physical systems. Examples include information and dynamical systems as well as integrations of

A Probabilistic Network Forensics Model for Evidence Analysis

September 20, 2016
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack

Trustworthy Email

September 6, 2016
Author(s)
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information security specialists and network managers. This guideline applies to federal IT systems and will

The Need for Realism when Simulating Network Congestion

April 2, 2016
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
Many researchers use simulation to investigate network congestion, often finding congestion spread can be modeled as percolation, spreading slowly under increasing load until a critical point, then spreading quickly through the network. The researchers

An Energy-Efficient Target Tracking Strategy for Mobile Sensor Networks

March 15, 2016
Author(s)
Kamran Sayrafian, Hamid Mahboubi, Walid Masoudimansour, Amir G. Aghdam
In this paper, an energy-efficient strategy is proposed for tracking a moving target in an environment with obstacles, using a network of mobile sensors. Typically, the most dominant sources of energy consumption in a mobile sensor network are sensing
Was this page helpful?