An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Airfoil shape design is a classical problem in engineering and manufacturing. In this work, we combine principled physics-based considerations for the shape design problem with modern computational techniques using a data-driven approach. Modern and
Susanna Mosleh, Jason Coder, Keith Forsyth, Mohamad Omar Al Kalaa, Christopher Scully
Objective: Respiratory motion (i.e., motion pattern and rate) can provide valuable information in many medical situations. This information may help diagnose different health disorders and diseases. Wi-Fi-based respiratory monitoring schemes utilizing
In this paper, we prove a compressive sensing guarantee for restricted measurement domains in spherical near-field to far-field transformations for antenna metrology. We achieve this by first defining Slepian functions on a measurement sub-domain $R$ of
Jacob Fabro, Gregory W. Vogl, Yongzhi Qu, Reese Eischens
Data-driven modeling of dynamical systems has drawn much research attention recently, with the goal of approximating the underlying governing rules of a dynamical system with data-driven differential equations. Many real-world dynamical systems can be
Michael Frey, Mary Gregg, Jason Coder, Azizollah Kord, Melissa Midzor, Anna Otterstetter, Jeanne Quimby, Alec Weiss
The National Institute of Standards and Technology's Communications Technology Laboratory conducted a cellular communication system pilot experiment in the summer of 2021. This pilot experiment was done to prepare for a broad-scope experiment to
Jacob Collard, Valeria de Paiva, Brendan Fong, Eswaran Subrahmanian
We investigate some different systems for extracting mathematical entities from texts in the mathematical field of category theory, as a first step for constructing a mathematical knowledge graph. We consider four different term extractors and compare
A graph is $k$-chordal if it does not have an induced cycle with length greater than $k$. We call a graph chordal if it is $3$-chordal. Let $G$ be a graph. The distance between the vertices $x$ and $y$, denoted by $d_G}(x,y)$, is the length of a shortest
Hsin-Yuan Huang, Richard Kueng, Giacomo Torlai, Victor Albert, John Preskill
Classical machine learning (ML) provides a potentially powerful approach to solving challenging quantum many-body problems that arise in physics and chemistry, but the advantages of ML over more traditional classical methods have not been firmly
Variational autoencoders (VAEs) are rapidly gaining popularity within molecular simulation for discovering low- dimensional, or latent, representations, which are critical for both analyzing and accelerating simulations. However, it remains unclear how the
Sarah Arpin, Tyler Billingsley, Daniel Hast, Jun Bo Lao, Ray Perlner, Angela Robinson
We present experimental findings on the decoding failure rate (DFR) of BIKE, a third-round candidate in the NIST Post-Quantum Standardization process, at the 20-bit security level. We select parameters according to BIKE design principles and conduct a
This Recommendation specifies techniques for the derivation of additional keying material from a secret key—either established through a key-establishment scheme or shared through some other manner—using pseudorandom functions: HMAC, CMAC, and KMAC.
In this paper, we explore the symmetric nature of the terminating basic hypergeometric series representations of the Askey–Wilson polynomials and the corresponding terminating basic hypergeometric transformations that these polynomials satisfy. In
Howard Cohl, James F. Lawrence, Lisa Ritter, Jessie Hirtenstein
On even-dimensional Euclidean space for integer powers of the positive Laplace operator greater than or equal to half the dimension, a fundamental solution of the polyharmonic equation has binomial and logarithmic behavior. Gegenbauer polynomial expansions
With an artificial example of a 2D nonlinear advection diffusion equation on the unit square this paper considers the data assimilation problem of finding initial values that can evolve into a close approximation to a desired target result at some
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public
We describe the utility of integral representations for sums of basic hypergeometric functions. In particular we use these to derive an infinite sequence of transformations for symmetrizations over certain variables which the functions possess. These