Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 23926 - 23950 of 73929

Contributions to anelasticity in langasite and langatate

December 30, 2011
Author(s)
Ward L. Johnson, Sudook A. Kim, Christine F. Rivenbark, Satoshi Uda
Maximization of the quality factors Q of langasite (LGS) and langatate (LGT) is necessary for optimal performance of acoustic resonators of these materials in frequency-control and high-temperature sensing applications. In this report, measurements and

Initiating Mobile Software Development - Lessons Learned From a 12-Month Project

December 30, 2011
Author(s)
Frederic J. de Vaulx, Paul Khouri Saba, Marcus W. Newrock, Bertrand C. Stivalet
As mobile devices’ capabilities keep on improving, today’s mobile software ecosystem evolves at an unprecedented speed. This evolution makes mobile software development more common and critical. Moreover, the ever-increasing number of new development

Oxidatively Induced DNA Damage and Cancer

December 30, 2011
Author(s)
M Miral Dizdar, Pawel Jaruga
Oxidatively induced DNA damage is caused by endogenous and exogenous sources in living organisms. Many resulting DNA lesions are mutagenic and lead to mutations commonly found in cancer. Repairs mechanisms exist to repair this type of DNA damage

Thermal Properties and Thermal Modeling of Ballistic Clay Box

December 30, 2011
Author(s)
Dale P. Bentz, Amanda L. Forster, Kirk D. Rice, Michael A. Riley
A critical component of hard and soft body armor testing is the utilization of a clay block behind the component being evaluated. One of the performance metrics used to evaluate products is the penetration depth into the clay of an indentation produced by

More than Moore or More Moore: a SWOT analysis

December 28, 2011
Author(s)
Herbert S. Bennett, G. D. Hutcheson
Over the last decade, the world of semiconductors has broadened its horizon from More Moore and beyond conventional scaling to More than Moore. Some first hypothesized the end of Moore’s law and the beginning of a new era. They saw it as an OR gate while

Spectroscopy of the methane N3 Band with an accurate midinfrared coherent dual-comb spectrometer

December 28, 2011
Author(s)
Esther Baumann, Fabrizio R. Giorgetta, William C. Swann, Alexander M. Zolot, Ian R. Coddington, Nathan R. Newbury
We demonstrate a high-accuracy dual-comb spectrometer centered at 3.4 υm. The amplitude and phase spectra of the P,, Q, and partial R branches of the methane Ņ3 band are measured at 25 to 100 MHz point spacing with resolution under 10 kHz and a signal-to

Laser cooling and readout of an LC resonator

December 27, 2011
Author(s)
Jacob M. Taylor, Anders Sorensen, C. M. Marcus, E.S. Polzik
We explore a method for laser cooling and optical detection of excitations in a LC electrical circuit. Our approach uses a nanomechanical oscillator as a transducer between optical and electronic excitations. An experimentally feasible system with the

Thermodynamic Properties of Dimethyl Carbonate

December 27, 2011
Author(s)
Yong Zhou, Jiangtao Wu, Eric Lemmon
A thermodynamic property formulation for dimethyl carbonate has been developed with the use of available experimental thermodynamic property data. The equation of state was developed with multi-property fitting methods involving single-phase pressure

Vulnerability Hierarchies in Access Control Configurations

December 27, 2011
Author(s)
David R. Kuhn
This paper applies methods for analyzing fault hierarchies to the analysis of relationships among vulnerabilities in misconfigured access control rule structures. Hierarchies have been discovered previously for faults in arbitrary logic formulae, such that

Recommendation for Existing Application-Specific Key Derivation Functions

December 23, 2011
Author(s)
Quynh H. Dang
Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys

Asymptotically Optimal Confidences for Rejecting Local Realism

December 22, 2011
Author(s)
Yanbao Zhang, Scott Glancy, Emanuel Knill
Reliable experimental demonstrations of violations of local realism are highly desirable for fundamental tests of Quantum Mechanics. Such violations can be quantified in terms of a confidence for rejecting local realism. We propose a method for computing

Copper oxide nanoparticle mediated DNA damage in terrestrial plant models

December 22, 2011
Author(s)
Bryant C. Nelson, Donald H. Atha, Elijah J. Petersen, Huanhua Wang, Danielle Cleveland, Richard D. Holbrook, Pawel Jaruga, M Miral Dizdar, Baoshan Xing
Engineered nanoparticles, due to their unique electrical, mechanical and catalytic properties, are presently found in many commercial products and will be intentionally or inadvertently released at increasing concentrations into the natural environment

Database-Assisted Design for Wind: Multiple Points-in-Time Approach

December 22, 2011
Author(s)
Dong Hun Yeo
One of the problems encountered in the estimation of wind effects on high-rise structures is the development of combinations of such effects as translational responses and the rotational response to wind, and/or forces and moments at various cross sections

Long-term Stability of the NIST Conical Reference Transducer

December 22, 2011
Author(s)
Steven E. Fick, Thomas M. Proctor
The National Institute of Standards and Technology (NIST) Conical Reference Transducer (CRT) is designed for purposes which require frequency response characteristics much more uniform than those attainable with ultrasonic transducers conventionally used

M-ary state phase-shift keying discrimination below the homodyne limit

December 22, 2011
Author(s)
Francisco E. Becerra Chavez, Jingyun Fan, Gerald Baumgartner, Sergey V. Polyakov, Julius Goldhar, Jonathan Kosloski, Alan L. Migdall
We investigate a strategy for M-ary discrimination of nonorthogonal phase states with error rates below the homodyne limit. This strategy uses feed forward to update a reference field and Signal nulling for the state discrimination. We experimentally

Mechanisms of Cement Hydration

December 22, 2011
Author(s)
Jeffrey W. Bullard, Hamlin M. Jennings, Richard A. Livingston, Andre Nonat, George W. Scherer, Jeffrey S. Schweitzer, Karen L. Scrivener, Jeffrey J. Thomas
Several detailed reviews have been written about the kinetics of cement hydration . In this review, focus is placed on a number of recent advances in understanding the principal mechanisms that govern the rate of hydration and microstructure development

Modeling and Simulation of Cement Hydration Kinetics and Microstructure Development

December 22, 2011
Author(s)
Jeffrey Thomas, Joseph J. Biernacki, Jeffrey W. Bullard, Shashank Bishnoi, Jorge S. Dolado, George W. Scherer, Andreas Luttge
This review endeavors to summarize the past 40 years or so of progress towards the development of mathematical models for understanding and predicting cement hydration behavior. A complete and accurate model of hydration would enable materials engineers

Chern Numbers Hiding in Time-of-Flight Images

December 21, 2011
Author(s)
Ian B. Spielman, Erhai Zhao, Noah Bray-Ali, Carl J. Williams, Indubala Satija
We present a novel technique for detecting topological invariants -- Chern numbers -- from time-of-flight images of ultra-cold neutral atoms. The Chern number of fermions in a lattice potential depends on magnetic field (for neutral atoms, generated by an
Displaying 23926 - 23950 of 73929
Was this page helpful?