Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 150 of 1482

Calibration strategy of the PROSPECT-II detector with external and intrinsic sources

June 1, 2023
Author(s)
Hans Mumm, Denis E. Bergeron, Mark Tyra, Jerome LaRosa, Svetlana Nour, PROSPECT Collaboration
… In this paper, we describe an external calibration strategy for P-II. The performance of externally deployed … liquid scintillator, energy scale … Calibration strategy of the PROSPECT-II detector with external and …

Influence of Scan Strategy and Process Parameters on Microstructure and Its Optimization in Additively Manufactured Nickel Alloy 625 via Laser Powder Bed Fusion

September 23, 2016
Author(s)
Yigit Arisoy, Luis Criales, Tugrul Ozel, Brandon Lane, Shawn P. Moylan, Alkan Donmez
… directional solidification that can be controlled by scan strategies and selection of process parameters. This study … laser power, scan velocity, hatch distance and scan strategy that produce various solidification cooling rates … Microstructure, Nickel alloy IN625 … Influence of Scan Strategy and Process Parameters on Microstructure and Its …

Advancing X-Ray Scattering Metrology Using Inverse Genetic Algorithms

July 7, 2016
Author(s)
Adam F. Hannon, Daniel F. Sunday, Donald A. Windover, Regis J. Kline
We compare the speed and effectiveness of two genetic optimization algorithms to the results of statistical sampling via a Markov Chain Monte Carlo algorithm to find which is the most robust method for determining real space structure in periodic gratings

Steering a Time Scale

December 1, 2008
Author(s)
Judah Levine
… I will also discuss the design of the steering of the backup for UTC(NIST), which is based on an ensemble of … located at the NIST radio station in Fort Collins. The backup time scale is intended to support the NIST services …

Best Practices for Privileged User PIV Authentication

April 21, 2016
Author(s)
Hildegard Ferraiolo, David Cooper, Andrew R. Regenscheid, Karen Scarfone, Murugiah P. Souppaya
The Cybersecurity Strategy and Implementation Plan (CSIP), published by the Office of Management and Budget (OMB) on October 30, 2015, requires that federal agencies use Personal Identity Verification (PIV) credentials for authenticating privileged users

Impact of Natural Ventilation Strategies and Design Issues for California Applications, Including Input to ASHRAE Standard 62 and California Title 24-Report on Task 4.4.3a and 4.4.3b of CEC-EEB RMT Project

October 1, 2003
Author(s)
Steven J. Emmerich, Andrew K. Persily, William S. Dols, James W. Axley
… This report discusses the impact of natural ventilation strategies and design issues for California applications and … is the emergence of hybrid natural and mechanical system strategies. The report also provides recommendations for …

General Strategy for the Design of Multiplex PCR Assays Involving Y STR Markers

January 1, 2002
Author(s)
R Schoske, Peter Vallone, C M. Ruitberg, John Butler
… Reaction (PCR) in a process termed multiplex PCR. A useful strategy involving the design, testing and optimization of … design, STRs, Y chromosome short tandem repeats … General Strategy for the Design of Multiplex PCR Assays Involving Y …

Guidelines on Securing Public Web Servers

October 9, 2007
Author(s)
Miles C. Tracy, Wayne Jansen, Karen A. Scarfone, Theodore Winograd
Web servers are often the most targeted and attacked hosts on organizations' networks. As a result, it is essential to secure Web servers and the network infrastructure that supports them. This document is intended to assist organizations in installing
Displaying 126 - 150 of 1482
Was this page helpful?