An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We develop complex Jacobi, Gegenbauer and Chebyshev polynomial expansions for the kernels associated with power-law fundamental solutions of the polyharmonic equation on d-dimensional Euclidean space. From these series representations we derive Fourier
Raghu N. Kacker, Linbin Yu, Yu Lei, David R. Kuhn, Ram D. Sriram, Kevin G. Brady
ISO/IEEE 11073 Personal Health Data (IEEE 11073 PHD) is a set of standards that addresses the interoperability of personal healthcare devices. As an important part of IEEE 11073 PHD, ISO/IEEE 1107-20601 optimized exchange protocol (IEEE 11073-20601)
This report summarizes the technical work of the Applied and Computational Sciences Division of NISTs Information Technology Laboratory. Part I (Overview) provides a high-level overview of the Divisions activities, including highlights of technical
Identifying sources of ground water pollution, and deblurring nanoscale imagery, as well as astronomical galaxy images, often involves the numerical computation of parabolic equations backward in time. However, very little computational experience has so
The widespread existence of slow crack growth in most glasses and ceramics due to a stress-enhanced reaction between an external environment and strained bonds at a crack tip greatly complicates the challenge of assuring the reliability of components which
In this paper, we introduce a combinatorial test generation tool called Advanced Combinatorial Testing System (or ACTS). ACTS supports t-way combinatorial test generation with several advanced features such as mixed-strength test generation and constraint
Mehra N. Borazjany, Laleh Ghandehari, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
The input space of a system must be modeled before combinatorial testing can be applied to this system. The effectiveness of combinatorial testing to a large extent depends on the quality of the input space model. In this paper we introduce an input space
Laleh Ghandehari, Mehra N. Borazjany, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
Combinatorial testing has attracted a lot of attention from both industry and academia. A number of reports suggest that combinatorial testing can be effective for practical applications. However, there still seems to lack systematic, controlled studies on
Combinatorial testing has been shown to be a very effective testing strategy. An important problem in combinatorial testing is dealing with constraints, i.e., restrictions that must be satisfied in order for a test to be valid. In this paper, we present an
It is a long accepted tenet of scientific practice that every measurement result ought to include a statement of uncertainty associated with the measured value, and that such uncertainty should be propagated to derivative products. It is also widely
Digital enhancements of latent fingerprints using Photoshop processing is the preferred methodology among law enforcement forensic experts. This report explores alternative enhancement methods that are independent of Photoshop, relying instead on such
Jeffrey T. Fong, William F. Guthrie, James J. Filliben, Nathanael A. Heckert
In this paper, we use a Bayesian quantitative nondestructive evaluation (QNDE) approach to estimating the remaining life of aging structures and components. Our approach depends on in-situ NDE measurements of detectable crack lengths and crack growth rates
This paper presents an estimate of the radius of convergence for Newton's method applied to a regularized TV-minimization problem often employed to denoise images. Strong Fréchet differentiability of this iteration is established and an estimate of the
We show that a character sum attached to a family of 3-isogenies defi ned on the fibers of a certain elliptic surface over Fp relates to the class number of the quadratic imaginary number field Q(\sqrtp}). In this sense, this provides a higher-dimensional
In four cases it is already known that the product of two distinct Jacobian theta functions having the same variable z and the same nome q is a multiple of a single Jacobian theta function, with the multiple independent of z. The main purpose of the
We obtain definite integrals for products of associated Legendre functions with Bessel functions, associated Legendre functions, and Chebyshev polynomials of the first kind using orthogonality and integral transforms.
Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have been
Timothy J. Burns, Steven P. Mates, Richard L. Rhorer, Eric P. Whitenton, Debasis Basak
Numerical finite-difference simulations of a two-dimensional transient fast convection-slow diffusion model of the temperature field in orthogonal cutting, due to Tlusty, have been shown to provide better predictions of the peak temperature during
The variable projection algorithm of Golub and Pereyra (1973) has proven to be quite valuable in the solution of nonlinear least squares problems in which a substantial number of the parameters are linear. Its advantages are efficiency and, more
We look at arithmetic progressions on elliptic curves known as Huff curves. By an arithmetic progression on an elliptic curve, we mean that either the x or y-coordinates of a sequence of rational points on the curve form an arithmetic progression. Previous
A binary de Bruijn sequence of order n is a cyclic sequence of period 2^n, in which each n-bit pattern appears exactly once. These sequences are commonly used in applications such as stream cipher design, pseudo-random number generation, 3-D pattern
Assane Gueye, Vladimir V. Marbukh, Jean C. Walrand
In this paper, we propose a quantification of the vulnerability of a communication network when links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between an attacker
Identifying sources of ground water pollution, and deblurring astronomical galaxy images, are two important applications generating growing interest in the numerical computation of parabolic equations backward in time. However, while backward uniqueness
This report summarizes the technical work of the Applied and Computational Sciences Division of NISTs Information Technology Laboratory.Part I (Overview) provides a high-level overview of the Divisions activities, including highlights of technical