Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 5701 - 5725 of 74220

Kinetics of Isopropanol Decomposition and Reaction with H atoms from Shock Tube Experiments and Rate Constant Optimization using the Method of Uncertainty Minimization using Polynomial Chaos Expansions (MUM-PCE)

September 28, 2020
Author(s)
Laura A. Mertens, Jeffrey A. Manion
Recent interest in isopropanol (2-propanol, C3H¬7OH) combustion stems from its potential as a renewable biofuel. Here, we report shock tube investigations of isopropanol decomposition and reaction with H atoms at (918 to 1212) K and (158 to 484) kPa

QARTOD - Prospects for Real-Time Quality Control Manuals, How to Create Them, and a Vision for Advanced Implementation

September 28, 2020
Author(s)
Mark Bushnell, Kathleen Bailey, Julie Bosch, Eugene Burger, Jennifer Dorton, Regina Easley, Bob Heitsenrether, Jeff King, Karen Grissom, Mario Tamburri, Julianna Thomas, Christoph Waldmann
The U.S. Integrated Ocean Observing System (IOOS) Quality Assurance / Quality Control of Real- Time Oceanographic Data (QARTOD) Project marshaled hundreds of volunteer subject matter experts to identify tests to evaluate real-time data quality by

Anteater: Interactive Visualization for Program Understanding

September 24, 2020
Author(s)
Rebecca Faust, Kartherin Isaacs, William Z. Bernstein, Michael Sharp, Carlos Scheidegger
Debugging is famously one the hardest parts in programming. In this paper, we tackle the question: what does a debugging environment look like when we take interactive visualization as a central design principle? We introduce Anteater, an interactive

Firearm examination: Examiner judgments and computer-based comparisons

September 24, 2020
Author(s)
Erwin J. Mattijssen, Cilia Witteman, Charles Berger, Xiaoyu Alan Zheng, Johannes A. Soons, Reinoud Stoel
Forensic firearm examination provides the court of law with information about the source of fired cartridge cases. We assessed the validity of source decisions of a computer-based method and of 73 firearm examiners who compared breechface and firing pin

Electron-Phonon Coupling and Superconductivity in the Doped Topological Crystalline Insulator (Pb 0.5 Sn 0.5 _) 1-x In x Te

September 23, 2020
Author(s)
A. Sapkota, Y. Li, B. L. Winn, A. Podlesnyak, Guangyong Xu, Zhijun Xu, Kejing Ran, Tong Chen, Jian Sun, Jinsheng Wen, Lihua Wu, Jihui Yang, Qiang Li, G. D. Gu, J. M. Tranquada
We present a neutron scattering study of phonons in single crystals of (Pb 0.5Sn 0.5) 1−xIn xTe with x = 0 (metallic, but nonsuperconducting) and x = 0.2 (nonmetallic normal state, but superconducting). We map the phonon dispersions (more completely for x

Machine Learning Methods for Predicting Seismic Retrofit Costs

September 23, 2020
Author(s)
Juan F. Fung, Siamak Sattar, David Butry, Steven L. McCabe
Aging building clusters all around the world, especially in high seismic regions, will require a retrofit approach to improve the resilience of the built environment. One of the main challenges of retrofitting existing buildings is the associated cost

Open Standards for Flexible Discrete Manufacturing in the Model-Based Enterprise

September 23, 2020
Author(s)
Mark White, Eric Holterman, Tim Bakker, Larry Maggiano
The Commonwealth Center for Advanced Manufacturing is currently constructing an open, standards-based flexible manufacturing cell. The manufacturing cell must take in a product definition, machine the defined part, inspect it, rework as necessary, and

Security and Privacy Controls for Information Systems and Organizations

September 23, 2020
Author(s)
Ronald S. Ross
This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks

A Diploid Assembly-based Benchmark for Variants in The Major Histocompatibility Complex

September 22, 2020
Author(s)
Justin M. Zook, Justin M. Wagner, Chen-Shan Chin, Qiandong Zeng, Alexander Dilthey, Tobias Marschall, Mikko Rautiainen, Erik Garrison, Shilpa Garg
Most human genomes are characterized by aligning individual reads to the reference genome, but accurate long reads and linked reads now enable us to construct accurate, phased de novo assemblies. We focus on a medically important, highly variable, 5

Chapter 8: Machine Performance Evaluation

September 22, 2020
Author(s)
Shawn Moylan
Machine performance evaluation is vital for objectively demonstrating that a machine can meet specification, standards and quality management system, and for allowing users to make informed decisions on how to best use their resources. Although additive

Data Integrity Recovering from Ransomware and Other Destructive Events

September 22, 2020
Author(s)
Anne R. Townsend, Timothy J. McBride, Lauren N. Lusty, Julian T. Sexton, Michael R. Ekstrom
Businesses face a near-constant threat of destructive malware, ransomware, malicious insider activities, and even honest mistakes that can alter or destroy critical data. These data corruption events could cause a significant loss to a company’s reputation
Displaying 5701 - 5725 of 74220