Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 6526 - 6550 of 9857

Requirements Analysis: Process Plan Specification - Workstation Level

June 1, 1998
Author(s)
Kimberley Ellis, Albert T. Jones, Yung-Tsun Lee
The Computer-Aided Manufacturing Engineering (CAME) program is developing a number of integrated software toolkits for design, manufacturing engineering, and production operations. One of these toolkits is the Manufacturing Engineering ToolKit (METK). The

Chapter 6: Virtual Environments for Design and Manufacture

October 1, 1997
Author(s)
Kevin W. Lyons, Scott Angster, Sankar Jayaram
The technology of computer-aided design and computer aided manufacturing (CAD/CAM) has progressed significantly from the two-dimensional wireframe drafting systems of the 1970''s to the parametric and feature-based solid modelers of the 1990''s. There are

MODELING OF HYDROGEN FLUORIDE FORMATION FROM FLAME SUPPRESSANTS DURING COMBUSTION

January 1, 1995
Author(s)
Valeri I. Babushok, Donald R. Burgess Jr., Gregory T. Linteris, Wing Tsang, A W. Miziolek
We have completed an initial computational study related to acid gas formation for two of the leading near-term Halon substitutes, FE-13 (CF,H) and HFC-125 (C,F,H), and compared these results with Halon 1301 (CF,Br). Our goal is to determine whether we can

Exppp - An EXPRESS Pretty Printer

January 1, 1993
Author(s)
Donald E. Libes
EXPRESS is a data modeling language. EXPRESS is relatively new having only been standardized in 1993. Today, few tools exist that automatically generate EXPRESS and correspondingly most EXPRESS is hand-written. In the future, we predict that all but a tiny

PRODUCT DATA EXCHANGE: The PDES Project--Status and Objectives

January 1, 1989
Author(s)
Bradford Smith
… companies are using an increasingly larger number of computing systems in all phases of design, analysis, … widely, a common factor among these systems is that each computing application has its own internal mathematical model …

DIGITAL SOLUTIONS FOR INTEGRATED AND COLLABORATIVE ADDITIVE MANUFACTURING

August 23, 2016
Author(s)
Yan Lu, Paul Witherell, Felipe F. Lopez, Ibrahim Assouroko
Software tools, knowledge of materials and process models, and data provide three pillars on which Additive Manufacturing (AM) lifecycles and value chains can be supported. These pillars leverage efforts dedicated to the development of AM databases, high

Poster:A Logic Based Network Forensics Model for Evidence Analysis

October 15, 2015
Author(s)
Anoop Singhal, Changwei Liu, Duminda Wijesekera
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack

Password policy languages: usable translation from the informal to the formal

July 21, 2015
Author(s)
Michelle P. Steves, Mary F. Theofanos, Celia Paulsen, Athos Ribeiro
Password policies – documents which regulate how users must create, manage, and change their passwords – can have complex and unforeseen consequences on organizational security. Since these policies regulate user behavior, users must be clear as to what is

Persistence-based Structural Recognition

June 28, 2014
Author(s)
Chunyuan Li
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and

Adaptive Representations for Video-based Face Recognition Across Pose

March 25, 2014
Author(s)
P. Jonathon Phillips, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
n this paper, we address the problem of matching faces across changes in pose in unconstrained videos. We pro- pose two methods based on 3D rotation and sparse representation that compensate for changes in pose. The first is Sparse Representation-based

Merging 3-D Symbolic Descriptions Obtained from Multiple Views of a Scene

October 31, 1986
Author(s)
Martin Herman
An algorithm is presented for merging three-dimensional symbolic descriptions of static polyhedral scenes obtained from multiple viewpoints. The 3-D descriptions are assumed to be partial because of occulusions. The merging algorithms treats the topology

Digital Signature Standard (DSS)

February 2, 2023
Author(s)
National Institute of Standards and Technology (NIST), Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson
This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed

A method for pole figure measurements via a dynamic segmented spiral scheme

February 1, 2023
Author(s)
Surya Chandramouleeswaran, Adam Creuziger, Kip Findley
A new method for pole figure measurement is described, titled a dynamic segmented spiral scheme. Compared to schemes currently in use, the dynamically segmented spiral scheme was shown to have advantages in term of evenness of pole figure coverage, time

Automatic Volumetric Segmentation of Additive Manufacturing Defects with 3D U-Net

March 23, 2020
Author(s)
Vivian W. Wong, Max Ferguson, Kincho Law, Yung-Tsun Lee, Paul Witherell
Segmentation of defects in additive manufacturing is challenging, due to the poor contrast, small sizes and variation in appearance of defects. Automatic segmentation can however provide quality control for additive manufacturing. Over recent years, 3D

An Introduction to Information Security

June 22, 2017
Author(s)
Michael Nieles, Kelley L. Dempsey, Victoria Y. Pillitteri
Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. This

Design of MEMS vision tracking system based on a micro fiducial marker

August 31, 2015
Author(s)
Yong Sik Kim, Yang Seung Ho, KwangWoong Yang, Nicholas Dagalakis
In this study, a MEMS-based vision tracking system is developed based on micro fiducial markers. The vision tracking system recognizes the predetermined patterns of the micro-scale fiducial markers and calculates the position and rotation of the MEMS

Virtual Cement and Concrete Testing Laboratory: Version 9.5 User Guide

May 29, 2014
Author(s)
Jeffrey W. Bullard
This document serves as the user’s guide for the Virtual Cement and Concrete Testing Laboratory (VCCTL) software, version 9.5. Using the VCCTL software, a user may create 3D microstructures of cement paste made with clinker, calcium sulfate, fly ash, slag

Study of Accuracy of Parts Produced Using Additive Manufacturing

April 16, 2014
Author(s)
Marcin Bauza, Shawn P. Moylan, Robert Panas, Stephen Burke, Harry Martz, John S. Taylor, Paul Alexander, Richard Knebel
The purpose of this presentation is to focus discussion onto the issue of accuracy and uncertainty of parts made with additive manufacturing processes.

Digital Signature Standard (DSS)

July 19, 2013
Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed
Displaying 6526 - 6550 of 9857
Was this page helpful?