NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Gabriel Taylor, Anthony D. Putorti Jr., Scott Bareham, Edward Hnetkovsky, Kenneth Hamburger, Nicholas Melly, Mark Henry Salley, Christopher U. Brown, Wai Cheong Tam, Eric Link, Michael Selepak, Philip Deardorff, Kenneth Miller, Paul Clem, Byron Demosthenous, Austin Glover, Chris LaFleur, Raymond Martinez, Anthony Tanbakuchi
This report documents an experimental program designed to investigate High Energy Arcing Fault (HEAF) phenomena for medium voltage electrical switchgear containing aluminum conductors. This report covers full-scale laboratory experiments using
Mohammad Balapour, Thiha Thway, Rathin Rao, Grace Hsuan, Yaghoob Franam, Newell Moser, Edward Garboczi
In this study, a systematic thermodynamics-based framework was applied to recycle waste low and high-calcium coal combustion Fly Ash (FA) into synthetic lightweight aggregates (LWA) through sintering. The process to successfully manufacture synthetic LWA
This article discusses the background and motivation of work conducted at NIST to advance first-generation performance-based design procedures in ASCE 41.
This paper revisits previous numerical predictions and experimental measurements of tensile strain capacity (TSC) in curved wide plate (CWP) specimens. The work is motivated by the arguably surprising conclusion in (Liu, Wang, Horsley, et al. 2012) that be
Yixue Hao, Yiming Miao, Min Chen, Hamid Gharavi, Victor Leung
With the rapid development of 5G communications, enhanced mobile broadband, massive machine type communications and ultra-reliable low latency communications are widely supported. However, a 5G communication system is still based on Shannon's information
Himanshu Neema, Leqiang Wang, CheeYee Tang, Keith A. Stouffer, Xenofon Koutsoukos
This study focuses on threat modeling, vulnerability analysis, and risk management within the critical railway transportation infrastructure. The Railway Transportation System is a highly complex, national critical infrastructure and its cybersecurity
Jamie Weaver, Carolyn Pearce, Robert Koestler, Bruce Arey, Albert Kruger, Paula DePriest, Andrew Plymale
Glass alteration in the presence of microorganisms has been a topic of research for over 150 years. Researchers from a variety of disciplines, including material science, biology, chemistry, geology, physics, and cultural heritage materials preservation
We discuss the measurement of aggregate levels of encounters in a population, a concept we call encounter metrics. Encounter metrics are designed so that they can be deployed while preserving the privacy of individuals. To this end, encounters are labeled
Jim McCarthy, Karen Reczek, Michael Bartock, Ya-Shian Li-Baboud, Suzanne Lightman, Arthur Scholz, Theresa Suloway, Doug Northrip, Joesph Brule
The national and economic security of the United States (US) is dependent upon the reliable functioning of critical infrastructure. Positioning, Navigation and Timing (PNT) services are widely deployed throughout the critical infrastructure. A disruption
Heather Evans, Kristen K. Greene, William M. Healy, Elizabeth Hoffman, Kate Rimmer, Anna V. Sberegaeva, Neil M. Zimmerman
The 2020 National Institute of Standards and Technology Environmental Scan provides an analysis of key external factors that could impact NIST and the fulfillment of its mission in coming years. The analyses were conducted through four separate lenses
Fahim H. Sadek, Travis E. Thonstad, Sorin Marcu, Jonathan Weigand, timothy J. barrett, Hai S. Lew, Long Phan, Adam L. Pintar
This report describes the results of Task 1 of a five-task comprehensive research program being conducted at the National Institute of Standards and Technology (NIST) under the sponsorship of the U.S. Nuclear Regulatory Commission (NRC). The overall study
Travis E. Thonstad, Jonathan Weigand, Fahim H. Sadek, Sorin Marcu, timothy J. barrett, Hai S. Lew, Long Phan, Adam L. Pintar
This report describes the results of Task 2 of a five-task comprehensive research program being conducted at the National Institute of Standards and Technology (NIST) under the sponsorship of the U.S. Nuclear Regulatory Commission (NRC). The overall study
Christa Torrence, Aishwarya Baranikumar, Zachary Grasley, Edward Garboczi
Nearly all nuclear power plants in the United States are operating past their intended lifetimes or are requesting lifetime extensions, therefore understanding changes to the concrete containment structure over time is crucial to evaluate the structure's
Jennifer L. Cawthra, Sue S. Wang, Bronwyn J. Hodges, Kangmin Zheng, Ryan T. Williams, Jason J. Kuruvilla, Christopher L. Peloquin, Kevin Littlefield, Bob Neimeyer
Medical imaging plays an important role in diagnosing and treating patients. The system that manages medical images is known as the picture archiving communication system (PACS) and is nearly ubiquitous in healthcare environments. PACS is defined by the
Peter Bajcsy, Joe Chalfoun, Mylene Simon, Mary C. Brady, Marcin Kociolek
This chapter addresses object measurements from 2D microscopy images. Object measurements (called image features) vary in terms of theoretical formulas for the same image feature, the physical units used to represent pixel-based measurements, the
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files, application code, and
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database records, system files, configurations, user files, applications, and customer data, are all
Storage technology, just like its computing and networking counterparts, has evolved from traditional storage service types, such as block, file, and object. Specifically, the evolution has taken two directions: one along the path of increasing storage
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and
The NIST Instrumented Charpy Test Suite is a set of standalone programs intended to allow anyone with appropriate hardware to perform and analyze instrumented Charpy impact tests. The software is provided in both raw code and executable formats with an
Frank W. DelRio, May L. Martin, Raymond L. Santoyo, Enrico Lucon
Background: About ten years ago, super-high energy Charpy specimens at the National Institute of Standards and Technology were removed from inventory due to unacceptable variability in absorbed energy, leading to the advent of new methods and materials to
James J. McCarthy, Lauren Acierto, Jason Kuruvilla, Titilayo Ogunyale, Nikolas Urlaub, John Wiltberger, Devin Wynne
Industrial control systems (ICS) compose a core part of our nations critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide
Edward Garboczi, Yang Lu, Aminul Islam, Stephen Thomas
All scanning electron microscopic (SEM) examination of mortars are based on two-dimensional (2D) slices through the true three-dimensional (3D) microstructure. Even though stereology guarantees that certain quantities are equal in 3D and in 2D slices of
A workshop on Consensus Safety Measurement Methodologies for Automated Driving System (ADS) - Equipped Vehicles was held at NIST 25-26 June 2019 on the NIST Gaithersburg, Maryland campus, sponsored by NIST and the U.S. Department of Transportation and