An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
NEURBT, a Fortran 77 program for computing neural networks for classification using batch learning, is discussed. NEURBT is based on Mφller's scaled conjugate gradient algorithm which is a variation of the traditional conjugate gradient method, better
Josef Sifuentes, Zydrunas Gimbutas, Leslie Greengard
We present a simple, accurate method for solving consistent, rank-deficient linear systems, with or without additional rank-completing constraints. Such problems arise in a variety of applications, such as the computation of the eigenvectors of a matrix
Dustin Moody, Rene C. Peralta, Ray A. Perlner, Andrew R. Regenscheid, Allen L. Roginsky, Lidong Chen
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NISTs position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in
Jose Torres Jimenez, Javier Bernal, Raghu N. Kacker
The bandwidth minimization problem on graphs (BMPG) consists of labeling the vertices of a graph with the integers from 1 to $n$ ($n$ is the number of vertices) such that the maximum absolute difference between labels of adjacent vertices is as small as
This paper discusses a two step enhancement technique applicable to noisy Helium Ion Microscope images in which background structures are not easily discernible due to a weak signal. The method is based on a preliminary adaptive histogram equalization
This paper proposes a neurobiology-based extension of integrate-and-fire models of Radial Basis Function Neural Networks (RBFNN) that adapts to novel stimuli by means of dynamic restructuring of the network's structural parameters. The new architecture
We derive eigenfunction expansions for a fundamental solution of Laplace's equation in three-dimensional Euclidean space in 5-cyclidic coordinates. There are three such expansions in terms of internal and external 5-cyclidic harmonics of first, second and
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone
Historically, multivariate public key cryptography has been less than successful at offering encryption schemes which are both secure and efficient. At PQCRYPTO '13 in Limoges, Tao, Diene, Tang, and Ding introduced a promising new multivariate encryption
A Brahmagupta quadrilateral is a cyclic quadrilateral whose sides, diagonals, and area are all integer values. In this article, we characterize the notions of Brahmagupta, introduced by K. R. S. Sastry, by means of elliptic curves. Motivated by these
Isabel M. Beichl, Amanda A. Streib, Noah S. Streib, Francis Sullivan
A large portion of the complexity inherent to the Ising model can be captures with a trivial amount of computation. in this work, we support this claim by defining an approximation to the partition function and other thermodynamic quantities of the Ising
This report summarizes the technical work of the Applied and Computational Sciences Division of NISTs Information Technology Laboratory. Part I (Overview) provides a high-level overview of the Divisions activities, including highlights of technical
Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the
Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N. Kacker, D. Richard Kuhn
Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the
[Poster] A t-way covering array can detect t-way faults, however they generally include other combinations beyond t-way as well. For example, a particular test set of all 5-way combinations is shown capable of detecting all seeded faults in a test program
Jon Hagar, D. Richard Kuhn, Raghu N. Kacker, Thomas Wissink
This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT would save
Step by step time-marching schemes are fundamental tools in the numerical exploration of well-posed nonlinear evolutionary partial differential equations. However, when the initial value problem is ill-posed, such stepwise time-marching numerical schemes
We describe an adaptive grid generation technique based on the composition of tensor product B-spline mappings, T and Phi, where Phi maps the unit square onto itself and T maps the unit square onto the desired physical domain. Variational methods are used
A software product line is a set of software systems that share some common features. Several recent works have been reported that apply combinatorial testing, a very effective testing strategy to software product lines. A unique challenge in these works
In this paper, we consider the approximate pointwise control of a linear parabolic system with multiple targets. The location of the pointwise controls are constrained and we assume hierarchy among the objectives, Optimality conditions are derived for a
Step by step time-marching schemes are fundamental tools in the numerical exploration of well-posed nonlinear evolutionary partial differential equations. However, when the initial value problem is ill-posed, such stepwise time-marching numerical schemes
Combinatorial testing has been shown to be a very effective testing strategy. After a failure is detected, the next task is to identify the actual fault that causes the failure. In this paper, we present an approach to fault localization that leverages the
Most modern instruments of measurements for science, engineering, and commerce have embedded software. Also software is required for data handling and mathematical computations. Therefore verification and validation of software used in metrology is
In this article, we study the quartic Diophantine equation x^4+y^4-2z^4-2w^4=0. We find non-trivial integer solutions. Furthermore, we show that when a solution has been found, a series of other solutions can be derived. We do so using two different
We look at certain character sums determined by isogenies on elliptic curves over finite fields. We prove a congruence condition for character sums attached to arbitrary cyclic isogenies, and produce explicit formulas for isogenies of degree m
Cryptographic applications, such as hashing, block ciphers and stream ciphers, make use of functions which are simple by some criteria (such as circuit implementations), yet hard to invert almost everywhere. A necessary condition for the latter property is