An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Raunak Bhinge, Jinkyoo Park, Kincho H. Law, David Dornfeld, Moneer Helu, Sudarsan Rachuri
Energy prediction of machine tools can deliver many advantages to a manufacturing enterprise, ranging from energy-efficient process planning to machine tool monitoring. Physics-based energy prediction models have been proposed in the past to understand the
Spencer J. Breiner, Eswaran Subrahmanian, Ram D. Sriram
As we extend the reach of the Internet through sensing and automation, networked systems interact more and more of our daily lives, requiring much greater sensitivity to social networks and greater robustness in the face of human behavior. A tremendous
Many engineering disciplines that interact with systems engineering use simulation tools to build models based on equations, which are solved to predict physical and informational behavior over time. Both kinds of engineering are concerned with physical
As new and exciting applications emerge using smart technologies, the Internet of Things, data analytics, and others for healthcare, a critical problem is emerging: the potential loss of "caring." The interplay of technology and caring has been discussed
Systems are integrations of devices or component elements and even other systems. The notion of a system comprehends engineered and biological or mechanical or physical systems. Examples include information and dynamical systems as well as integrations of
Christopher S. Johnson, Mark L. Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
Cyber threat information is any information that can help an organization identify, assess, monitor, and respond to cyber threats. Cyber threat information includes indicators of compromise; tactics, techniques, and procedures used by threat actors
This bulletin summarizes the information presented in NIST SP 800-183, Networks of 'Things'. This publication offers an underlying and foundational science to IoT based on the realization that IoT involves sensing, computing, communication, and actuation.
Although many aspects of passwords have been studied, no research to date has systematically examined how ambiguous terminology affects the user experience during password rule comprehension, a necessary precursor to password generation. Our research
In this paper we provide a broad framework for describing learning agents in general quantum environments. We analyze the types of environments which allow for quantum enhancements in learning, by contrasting environments to quantum oracles. We show that
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information security specialists and network managers. This guideline applies to federal IT systems and will
Nader Moayeri, Mustafa O. Ergin, Filip Lemic, Vlado Handziski, Adam Wolisz
This paper describes a major effort to collect smartphone data useful for indoor localization. Data has been collected with four Android phones according to numerous scenarios in each of four large buildings. The data includes time-stamped traces of
Advances in single photon creation, transmission, and detection suggest that sending quantum information over optical fibers may have losses low enough to be correctable using a quantum error correcting code. Such error-corrected communication is
Ontologies are semantic tools for Artificial Intelligence. Ontologies list and define objects in a domain and the relationship among objects such as to do reasoning within and among systems. Mistakes within ontologies bring system errors if their use in a
Empirical studies have shown that most software interaction faults involve one or two variables interacting, with progressively fewer triggered by three or more, and no failure has been reported involving more than six variables interacting. This paper
Paul Witherell, Ibrahim Assouroko, Roh Byeong-Min, Timothy Simpson, Soundar Kumara
Additive manufacturing (AM) is creating renewed interest in manufacturing thanks to the freedom it provides to design and innovate. One of the biggest challenges in AM is inadequate repeatability in product quality and reliability of the process for
The document describes the procedure by which fingerprint image downsampling procedures will be evaluated with respect to conformance to the NIST guidance for sample rate reduction of 1000 ppi friction ridge images to 500 ppi as specified in NIST Special
This paper discusses effect of bounded rationality on the systemic risks vs. economic performance tradeoff in large-scale networks operating under economic pressures. Existence of systemic risks in economically incentivized networked systems is
Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
This bulletin summarized the information presented in NIST SP 800-156: Derived PIV Application and Data Model Test Guidelines and NIST SP 800-166: Representation of PIV Chain-of-Trust for Import and Export. These publications support Federal Information
Bonnie J. Dorr, Craig Greenberg, Peter Fontana, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L. Chang
This article sets out to examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Research Program and associated Data Science Evaluation (DSE) series
Bonnie J. Dorr, Craig Greenberg, Peter Fontana, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Edmond J. Golden III, Wo L. Chang
We examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Initiative and evaluation series, introduced by the Information Access Division at the
The annellation theory method has been used to predict the locations of maximum absorbance (LMA) of the ultravioletvisible (UV-Vis) spectral bands in the group of polycyclic aromatic hydrocarbons (PAHs) C24H14 (dibenzo and naphtho)derivatives of
Cooperative linear dispersion coding (LDC) can support arbitrary configurations of source nodes and destination nodes in virtual multi-input multi-output (MIMO) systems. In this paper, we investigate two spatial diversity applications of cooperative LDC
For many organizations, their employees, contractors, business partners, vendors, and/or others use enterprise telework or remote access technologies to perform work from external locations. All components of these technologies, including organization