An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Many researchers have used simulation to investigate the spread of congestion in networks. These researchers often find that congestion can be modeled as a percolation process, spreading slowly under increasing load until a critical point. After the
With a growth of surveillance cameras, the amount of captured videos expands. Manually analyzing and retrieving surveillance video is labor intensive and expensive. It would be much more convenient to generate a video digest, with which we can view the
Laboratory notebooks have been a staple of scientific research for centuries for organizing and documenting ideas and experiments. Modern laboratories are more and more reliant on electronic data collection and analysis so it seems inevitable that the
With the rise of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks. An important aspect of this trend has been the study of dramatic, but relatively infrequent, events that result
Real-time sensor data is essential for making decisions in controlling industrial processes. Wireless sensor networks (WSN's) are becoming more common for industrial processes and condition monitoring. However, wireless communication is subject to
Although there are many important CPS systems in practice, one of the most complex applications is the Smart Grid whose function is to distribute reliable and efficient electric energy with a high degree of sustainability. While the Smart Grid aims to
There has been a growing interest in the deployment of Phasor Measurement Units (PMUs) not only in high-voltage transmission, but in lower-voltage distribution systems. For a Distributed Generation (DG) grid this would require deployment of PMUs at
This paper presents an effective and simple image resizing method. Our method is an improved version of seam carving that changes the backtracking basis of seam carving. We use a Scale Invariant Feature Transform (SIFT) feature in our method. SIFT key
Image retargeting attempts to adapt images to different devices while preserving the salient contents. Most existing methods address retargeting of a single image. In this paper, we propose a novel image retargeting method for resizing a pair of stereo
There has been a growing interest in the deployment of Phasor Measurement Units (PMUs) in a Distributed Generation (DG) grid system. The main obstacle is the lack of a communication network infrastructure that can support phasor measurements for
In this treatise, we focus our attention on the cooperative uplink transmissions of systems beyond the LTE-Advanced initiative. We commence a unified treatment of the principle of single-carrier frequency-division multiple-access (FDMA) and the
This incoming Editor In Chief's (EIC) message is expected to appear in the next issue of the IEEE wireless communications. The editorial team will be under the leadership of the new EIC for a period of three years.
In this chapter, efficient deployment strategies for mobile sensor networks are proposed to improve the coverage area in target fields containing obstacles. The developed algorithms iteratively calcu- late and update the position of the sensors in order to
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
We characterize the effects of asymmetries, dynamics, and failures when introduced into a cloud computing simulator, which had previously been characterized under static, homogeneous configurations with various patterns of demand and supply. We aim to
David W. Griffith, Richard A. Rouil, Antonio Izquierdo Manzanares, Nada T. Golmie
The National Public Safety Telecommunications Council (NPSTC) has defined Resiliency as the ability of a network to withstand the loss of assets and to recover quickly from such losses. How to measure the resiliency of a base station deployment is an
Opportunistic Spectrum Access (OSA) is one of the models proposed in the literature for Dynamic Spectrum Access (DSA). Providing disruption QoS in terms of interference caused to the Primary Users (PUs) is crucial in such systems. In this paper, we use a
Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, David W. Griffith, Nada T. Golmie
There has been growing interest over the past few years in the US and around the world to build reliable, robust, and interoperable public safety broadband networks for emergency and disaster response. In this paper, we propose a low-cost, dynamic
The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of the testbed is to measure the performance of ICS when instrumented with cybersecurity countermeasures in
Kevin L. Mills, James J. Filliben, Junfei Xie, Yan Wan, Yi Zhou, Yu Lei
Effective uncertainty evaluation is a critical step toward real-time and robust decision-making for complex systems in uncertain environments. A Multivariate Probabilistic Collocation Method (M-PCM) was developed to effectively evaluate system uncertainty
Sungseob Lee, SuKyoung Lee, Kim KyungSoo, David W. Griffith, Nada T. Golmie
As data traffic demand in cellular networks grows exponentially, operators need to add new cell sites to keep up; unfortunately, it is costly to build and operate macrocells. Moreover, it may not be possible to obtain the needed approvals for additional
The National Institute of Standards and Technology (NIST), consistent with its mission, has a technology leadership role in support of United States Government (USG) secure and effective adoption of the Cloud Computing model to reduce costs and improve
Xing Chen, Wei Yu, David W. Griffith, Nada T. Golmie, Guobin Xu, Chao Lu
Recently, there are growing concerns about smart grid security and resilience. The performance of smart grid may suffer from component failures or targeted attacks. A sophisticated adversary may target critical components in a smart grid, leading to
Wei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu
Developing effective energy resource management in the smart grid is challenging because the entities in both the demand and supply sides experience various uncertainties. This paper addresses the issue of quantifying uncertainties on the energy demand
We intend to use a classic genetic algorithm (GA) to steer a population of cloud-computing simulators into behavioral directions that reveal degraded performance and system collapse. Such a method could serve as a design tool, empowering system engineers