Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1426 - 1450 of 2282

Real-Time Deployment of Multihop Relays for Range Extension

June 11, 2007
Author(s)
Michael R. Souryal, Johannes Geissbuehler, Leonard E. Miller, Nader Moayeri
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through multihop relaying. This paper targets the need in certain scenarios for rapid

3-D Segmentation and Motion Estimation of Range Data for Crash Prevention

June 6, 2007
Author(s)
Hamid Gharavi
In this paper we present a 3-D object segmentation and motion estimation scheme of range video data for crash prevention applications. The segmentation is based on slope values of every point in the scene with which atomic regions are constructed by region

Guidelines for Securing Radio Frequency Identification (RFID) Systems

April 6, 2007
Author(s)
Tom T. Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn, T. Phillips
This publication seeks to assist organizations in understanding the risks of RFID technology and security measures to mitigate those risks. It provides practical, real-world advice on how to initiate, design, implement and operate RFID systems in a manner

Recursive Motion Estimation of Range Image

April 4, 2007
Author(s)
Hamid Gharavi, Shaoshuai Gao
In this paper, we present an innovative recursive motion estimation technique that can take advantage of the in-depth resolution (range) to perform an accurate estimation of objects that have undergone 3-D translational and rotational movements. This

Sensor Location through Linear Programming with Arrival Angle Constraints

March 14, 2007
Author(s)
Camillo Gentile, J Shiu
In previous work, we established a linear programming framework to determine sensor location from measured link distances between neighboring nodes in a network. Besides providing greater accuracy compared to other techniques, linear programs in particular

Estimating Common Vector Parameters in Interlaboratory Studies

March 13, 2007
Author(s)
Andrew L. Rukhin
The primary goal of this work is to extend two methodsof random effects models to multiparameter situation. These methods comprise the DerSimonian-Laird estimator, arising in the meta-analysis, and the Mandel-Paule algorithm widely used in interlaboratory

3-D Motion Estimation Using Range Data

March 1, 2007
Author(s)
Hamid Gharavi, Shaoshuai Gao
Advanced vehicle-based safety and warning systems use laser scanners to measure road geometry (position, curvature), and range to obstacles in order to warn a driver of an impending crash and/or to activate safety devices (air bags, brakes, steering). In

Guide to Intrusion Detection and Prevention Systems (IDPS)

February 20, 2007
Author(s)
Karen A. Scarfone, Peter M. Mell
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Low-Noise PPLN-based Single-Photon Detector

February 13, 2007
Author(s)
Hai Xu, Lijun Ma, Oliver T. Slattery, Xiao Tang
This paper describes the detection of single photons, which have been transmitted through standard fiber at the telecom wavelength of 1310 nm. Following transmission, the 1310-nm photon is up-converted to 710 nm in a periodical-poled LiNbO3 (PPLN)

Scanning Advanced Automobile Technology

January 31, 2007
Author(s)
Hamid Gharavi, K V. Prasad, P. Ioannou
The progress of some of the key electrical, electronics, communications, controls and software technologies that enable in-vehicle, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) functions is presented, in historical, current & futuristic

A Comprehensive Evaluation of Indoor ranging using Ultra-Wideband Technology

January 15, 2007
Author(s)
Camillo Gentile, El Kik
Ultra-wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the baseband to penetrate walls. While a concerted effort has been conducted in the extensive

A Pel-Recursive Motion Estimation Algorithm

January 9, 2007
Author(s)
Hamid Gharavi, H Reza-alikhani
This paper presents a new pel recursive motion estimation algorithm for video coding applications. The derivation of the algorithm is based on Recursive Least-Squares (RLS) estimation that minimizes the mean square prediction error. A comparison with the

A Survey of Self-Organization in Wireless Networks

January 1, 2007
Author(s)
Kevin L. Mills
This paper surveys recent research on self-organizing techniques applied to design and control large wireless ad hoc and sensor networks. The survey divides that research into five functional categories: (1) resource sharing, (2) structure formation and

Nonparametric Analysis of Fingerprint Data on Large Data Sets

December 7, 2006
Author(s)
Jin Chu Wu, Charles Wilson
By executing different fingerprint-image matching algorithms on large data sets, it reveals that the match and non-match similarity scores have no specific underlying distribution function. Thus, it requires a nonparametric analysis for fingerprint-image

An Empirical Study of Sample Size in ROC-Curve Analysis of Fingerprint Data

December 4, 2006
Author(s)
Jin Chu Wu, Charles Wilson
The fingerprint datasets in many cases may exceed millions of samples. Thus, the needed size of a biometric evaluation test sample is an important issue in terms of both accuracy and efficiency. In this article, an empirical study, namely, using Chebyshev

Information Security Handbook: A Guide for Managers

December 1, 2006
Author(s)
Pauline Bowen, Joan Hash, Mark Wilson
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for
Was this page helpful?