An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Shahram Orandi, John M. Libert, Michael Garris, John Grantham, Frederick R. Byers
The document describes the procedure by which applications of JPEG 2000 CODECs will be evaluated with respect to conformance to the NIST guidance for compression of 1000 ppi friction ridge images as detailed in NIST Special Publication 500-289 [NIST5]
In this era of inter-connectivity where almost everybody, everything, and anything are networked, Cyber-Physical Systems (CPS) also known as the Internet of Things (IoT) have emerged as vital systems that use information systems to observe and modify the
In this treatise, we focus our attention on the cooperative uplink transmissions of systems beyond the LTE-Advanced initiative. We commence a unified treatment of the principle of single-carrier frequency-division multiple-access (FDMA) and the
Bonita V. Saunders, Brian Antonishek, Qiming Wang, Bruce R. Miller
In 1997 the National Institute of Standards and Technology (NIST) embarked on a huge project to replace one of the most cited resources for mathematical, physical and engineering scientists, the Handbook of Mathematical Functions with Formulas, Graphs, and
This incoming Editor In Chief's (EIC) message is expected to appear in the next issue of the IEEE wireless communications. The editorial team will be under the leadership of the new EIC for a period of three years.
The ability to share precise models of suppliers manufacturing service capability (MSC) information is necessary to develop reliable methods that enable Original Equipment Manufacturers (OEMs) to efficiently configure agile and responsive supply chains
The objective of the SHREC'15 Range Scans based 3D Shape Retrieval track is to evaluate algorithms that match range scans of real objects to complete 3D mesh models in a target dataset. The task is to retrieve a rank list of complete 3D models that are of
Kristen Greene, Joshua M. Franklin, John M. Kelsey
Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics
Nathan A. Hotaling, Kapil Bharti, Haydn Kriel, Carl G. Simon Jr.
Despite the growing use of nanofiber scaffolds for tissue engineering applications, there is not a validated, readily available (commercial or open source) solution for rapid, automated analysis of nanofiber diameter from scanning electron microscope (SEM)
We propose a novel shape optimization algorithm for region-based active contour models. Region-based active contours are preferred for many segmentation problems, because they incorporate more global information by aggregating cues or statistics over the
Jon Hagar, Thomas Wissink, D. Richard Kuhn, Raghu N. Kacker
A two-year study of eight pilot projects to introduce combinatorial testing in a large aerospace corporation found that the new methods were practical, significantly lowered development costs, and improved test coverage by 20 to 50 percent.
The Text REtrieval Conference (TREC) Clinical Decision Support Track fosters research on systems that link electronic health records with information that is relevant for patient care. TREC 2014 is the initial year of the track. The focus of the first year