An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Application of least-squares as, for instance, in curve fitting is an important tool of data analysis in metrology. It is tempting to employ the supplement 1 to the GUM (GUM-S1) to evaluate the uncertainty associated with the resulting parameter estimates
Katharine M. Mullen, David Ardia , David L. Gil, Donald A. Windover, James P. Cline
This article describes the R package DEoptim which implements the differential evolution algorithm for the global optimization of a real-valued function of a real-valued parameter vector. The implementation of differential evolution in DEoptim interfaces
James F. Lawrence, Raghu N. Kacker, Yu Lei, David R. Kuhn, Michael Forbes
Two-valued covering arrays of strength t are 0--1 matrices having the property that for each t columns and each of the possible 2t sequences of t 0's and 1's, there exists a row having that sequence in that set of t columns. Covering arrays are an
We look at arithmetic progressions on elliptic curves known as Edwards curves. By an arithmetic progression on an elliptic curve, we mean that the x-coordinates of a sequence of rational points on the curve form an arithmetic progression. Previous work has
This report summarizes the technical work of the Applied and Computational Sciences Division (ACMD) of NIST s Information Technology Laboratory. Part I (Overview) provides a high-level overview of the Division s activities, including highlights of
We define a class of matroids A for which a fully polynomial randomized approximation scheme (fpras) exists for counting the number of bases of the matroids. We then show that as the number of elements in a matroid increases, the probability that a matroid
Meltem Sonmez Turan, Elaine B. Barker, William E. Burr, Lidong Chen
This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection keys.
Raghu N. Kacker, Ruediger Kessel, Klaus-Dieter Sommer
When the data consist of multiple results of measurement for a common measurand, often one needs to determine whether the results agree with each other. A result of measurement based on the Guide to the Expression of Uncertainty in Measurement (GUM)
It is known that, if the mid-point of a rectangular distribution is specified, the half-width is inexactly known, and the state of knowledge about the half-width may be represented by a narrower rectangular distribution then the resulting distribution
Generalized Linnik processes and associated logarithmic diffusion equations can be constructed by appropriate Bochner randomization of the time variable in Brownian motion and the related heat conduction equation. Remarkably, generalized Linnik
David E. Gilsinn, Kiran Bhadriraju, John T. Elliott
Biological cells are composed of many subsystems and organelles. The subsystem called the cytoskeleton is composed of long rod-shaped structures. They give the cell form and help attach the cell to the substrate and neighbors. One of the filaments is
The invariant torus of a coupled system of Van der Pol oscillators is approximated using bicubic B-splines. The paper considers the case of strong nonlinear coupling. In particular, the shapes of invariant torii for the Van der Pol coupling parameter $
A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is key to understanding the Bloom
Bert W. Rust, Dianne M. O'Leary, Katharine M. Mullen
Type Ia supernova light curves are characterized by a rapid rise from zero luminosity to a peak value, followed by a slower quasi-exponential decline. The rise and peak last for a few days, while the decline persists for many months. It is widely believed
Raghu N. Kacker, Ruediger Kessel, Klaus-Dieter Sommer, Xin Bian
The traditional concept of consistency in multiple evaluations of the same measurand is statistical. The statistical view of consistency does not match the modern view of uncertainty in measurement; in particular, it does not apply to the results of
A hash function is near-collision resistant, if it is hard to find two messages with hash values that differ in only small number of bits. In this study, we used hill climbing methods to find near-collisions for some of the second round SHA-3 candidates
Feedback shift registers are basic building blocks for many cryptographic primitives. Due to the insecurities of Linear Feedback Shift Register (LFSR) based systems, the use of Nonlinear Feedback Shift Registers (NFSRs) became more popular. In this work
Bodt Bodt, Richard Camden, Harry A. Scott, Adam S. Jacoff, Tsai H. Hong, Tommy Chang, Richard J. Norcross, Anthony Downs, Ann Virts
The Army Research Laboratory (ARL) Robotics Collaborative Technology Alliance (CTA) conducted an assessment and evaluation of multiple algorithms for real-time detection of pedestrians in Laser Detection and Ranging (LADAR) and video sensor data taken from
Paul R. Garabedian, a leader in the field of computational science, passed away on May 13th, 2010, at his home in Manhattan at the age of 82 after a long battle with cancer. During the course of sixty years of research on the faculties at Stanford and New
Frank W. Olver, Daniel W. Lozier, Ronald Boisvert, Charles W. Clark
The NIST Handbook of Mathematical Functions supplies validated reference information in 36 chapters on a wide selection of important mathematical functions, covering the properties necessary for their use in scientific applications, together with general
David E. Gilsinn, Bruce R. Borchardt, Amelia Tebbe
The Food and Drug Administration (FDA) is conducting research on developing reference lung cancer cancer lesions, called phantoms, to test computed tomography (CT) scanners and their software. FDA loaned two semi-spherical phantoms to the National
We present methodology and preliminary results of a Monte-Carlo simulation to perform a quantified analysis of regularized deconvolution in the context of full waveform metrology. We analyze the behavior of different regularized inversion methods with
We perform linear stability calculations for horizontal bilayers of a two-component fluid that can undergo a phase transformation, taking into account both buoyancy effects and thermocapillary effects in the presence of a vertical temperature gradient