Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 599

Data Requirements for a Digital Twin of a Robot Workcell

February 1, 2024
Author(s)
Deogratias Kibira, Guodong Shao
The applications of digital twins continue to grow with the volume and variety of data collected. These data support the modeling of function, behavior, and structure of a physical element. However, successfully building a digital twin requires data

Maintenance and Operations of Manufacturing Digital Twins

December 13, 2023
Author(s)
Alp Akcay, Stephan Biller, Boon Ping Gan, Christoph Laroque, Guodong Shao
Digital twins have become an important element in smart manufacturing. As any other product, digital twins also have a lifecycle, starting from specifying the requirements of the digital twins until their decommissioning. As part of the Manufacturing and

Physical Component Libraries for SysPhS Modeling and Simulation in Manufacturing

October 10, 2023
Author(s)
Charles Manion, Conrad Bock, Raphael Barbau
Computer-interpretable representations of system structure and behavior are at the center of developing today's complex systems. Systems engineers create and review these representations using graphical languages and information models that capture

RECENT DEVELOPMENTS IN ONTOLOGY STANDARDS AND THEIR APPLICABILITY TO BIOMANUFACTURING

July 14, 2023
Author(s)
Milos Drobnjakovic, Boonserm Kulvatunyou, Simon P. Frechette, Vijay Srinivasan
ISO and IEC have jointly initiated, and recently issued, a series of standards (the ISO/IEC 21838 series) for top-level ontologies. These standards have been used by industrial consortia to develop and disseminate standards for mid-level ontologies to ease

Current challenges and recent advances on the path towards continuous biomanufacturing

June 21, 2023
Author(s)
Boonserm Kulvatunyou, Milos Drobnjakovic, Nenad Ivezic, Vijay Srinivasan, Roger Hart
Continuous biopharmaceutical manufacturing is currently a field of intense research due to its potential to make the entire production process more optimal for the modern, ever-evolving biopharmaceutical market. Compared to traditional batch manufacturing

A Methodology for Digital Twins of Product Lifecycle Supported by Digital Thread

February 8, 2023
Author(s)
Laetitia Monnier, Guodong Shao, Sebti Foufou
The technological advancement has led to the transition of manufacturing industries to Smart Manufacturing and Industry 4.0. Promising concepts such as Digital Twin and Digital Thread could help speed up the transition. One of the benefits of using digital

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

December 30, 2022
Author(s)
Athanasios Dimitriadis, Efstratios Lontzetidis, Boonserm Kulvatunyou, Nenad Ivezic, Dimitris Gritzalis, Ioannis Mavridis
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks. More sophisticated approaches apply machine learning to

Architecture Definition in Complex System Design Using Model Theory

October 4, 2022
Author(s)
Charles Dickerson, Michael Wilkenson, Eugenie Hunsicker, Siyuan Ji, Mole Li, Yves Bernard, Graham Bleakley, Peter O. Denno
Architecture Definition, which is central to system design, is one of the two most used technical processes in the practice of model-based systems engineering. In this paper a fundamental approach to architecture definition is presented and demonstrated

Verifying Executability of SysML Behavior Models Using Alloy Analyzer

February 24, 2022
Author(s)
Jeremy Doerr, Conrad Bock, Raphael Barbau
This report presents an approach to verifying executability of system behavior models by treating them as logical constraint problems solved using Alloy Analyzer, a non-proprietary software tool supporting a textual language for logical constraints and

Quantitative Determination of Cell Viability Using Absorbance Microscopy

January 19, 2022
Author(s)
Greta Babakhanova, Stephen Zimmerman, Laura Pierce, Sumona Sarkar, Nicholas Schaub, Carl Simon Jr.
Cell viability is an essential measurement for cell therapy products. One of the most common tests is Trypan blue (TB) dye exclusion where blue-stained cells are counted via imaging. Typically, live and dead cells are counted based on pixel intensities of

Quantifying Machining Process Inventories In Detailed Design

August 24, 2021
Author(s)
William Z. Bernstein, Till Boettjer, Deverajan Ramanujan
This paper quantifies machining process inventories based on commonly used techniques in various stages of the detailed design process. We investigate variabilities in process inventories between these techniques and their relation to manufacturing process

Advances in Production Management Systems: Issues, Trends, and Vision Towards 2030

August 13, 2021
Author(s)
Boonserm Kulvatunyou, David Romero, Gregor V. Cieminski, Paolo Gaiardelli, Ilkyeong Moon, Giuditta Pezzotta, Stefan Wiesner, Marco Macchi, Jannicke B. Hauge, Irene Roda, Daryl Powell, Torbj?rn Netland, Nick Szirbik, Christoph Roser, Erlend Alfnes, Martin Rudberg
Since its inception in 1978, the IFIP Working Group 5.7 on Advances in Production Management Systems (APMS) has played an active role in the conception, development, and application of innovative strategies, frameworks, architectures, processes, methods

Contextualized Filtering for Shared Cyber Threat Information

July 18, 2021
Author(s)
Athanasios Dimitriadis, Christos Prassas, Jose L. Flores, Boonserm Kulvatunyou, Nenad Ivezic, Dimitris Gritzalis, Ioannis Mavridis
Cyber threat information sharing is an imperative process towards achieving collaborative security, but it poses several challenges. One crucial challenge is the plethora of shared threat information. Therefore, there is a need to advance filtering of such
Displaying 1 - 25 of 599