Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 29001 - 29025 of 143806

A universal Moire effect and application in x-Ray phase-contrast imaging

April 25, 2016
Author(s)
Houxun Miao, Alireza Panna, Andrew A. Gomella, Eric E. Bennett, sami Znati, Lei Chen, Han Wen
A moiré pattern is created by superimposing two black-and-white or gray-scale patterns of regular geometry, such as two sets of evenly spaced lines. We observed an analogous effect between two transparent phase masks in a light beam which occurs at a

Baseline Tailor User Guide

April 25, 2016
Author(s)
Joshua Lubell
This guide describes how to use Baseline Tailor, a software tool for navigating the United States Government's Cybersecurity Framework and for tailoring the National Institute of Standards and Technology Special Publication 800-53 Revision 4 security

Direct imaging of coexisting ordered and frustrated sublattices in artificial ferromagnetic quasicrystals

April 25, 2016
Author(s)
Barry Farmer, Vinayak Bhat, Andrew L. Balk, Eric Teipel, Nathan Smith, John Unguris, D.J. Keavney, Todd Hastings, L .E. De Long
Quasicrystals are rarely found in nature and are difficult to grow in the laboratory, but exhibit unique physical properties resulting from their signature long-range structural order without periodic translational symmetry. Magnetic interactions in

Electronic Nature of the Lock-in Magnetic Transition in CeXAl 4 Si 2

April 25, 2016
Author(s)
J. Gunasekera, Leland Harriger, A. Dahal, A. Maurya, T.W. Heitmann, Steven M.T. Disseler, A. Thamizhavel, S. Dhar, D. J. Singh, D. K. Singh
We have investigated the underlying magnetism in newly discovered single crystal Kondo lattices CeXAl 4Si 2, where X = Rh, Ir. We show that the compound undergoes an incommensurate-to- commensurate magnetic transition at Tc = 9.19 K (10.75 K in Ir). The

Measuring the Usability and Security of Permuted Passwords on Mobile Platforms

April 25, 2016
Author(s)
Kristen K. Greene, John M. Kelsey, Joshua M. Franklin
Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics

Optical Spintronics in Organic-Inorganic Perovskites Photovoltaics

April 25, 2016
Author(s)
Junwen Li, Paul M. Haney
Organic-inorganic halide CH 3NH 3PbI 3 solar cells have attracted enormous attention in recent years due to their remarkable power conversion efficiency. These materials should exhibit interesting spin-dependent properties as well, owing to the strong spin

Synchrotron X-Ray Microbeam Diffraction Measurements of Full Elastic Long Range Internal Strain and Stress Tensors in Commercial-Purity Aluminum Processed by Multiple Passes of Equal-Channel Angular Pressing

April 23, 2016
Author(s)
Thien Q. Phan, Lyle E. Levine, I-Fang Lee, Jonathan Z. Tischler, Ruqing Xu, Yi Huang, Terrance G. Langdon, Michael E. Kassner
Synchrotron X-ray microbeam diffraction was used to measure the full elastic long range internal strain and stress tensors of low dislocation density regions within the submicrometer grain/subgrain structure of equal-channel angular pressed (ECAP) AA1050

Guidelines for the Creation of Interoperable Software Identification (SWID) Tags

April 22, 2016
Author(s)
David A. Waltermire, Brant Cheikes, Larry Feldman, Gregory A. Witte
This report provides an overview of the capabilities and usage of software identification (SWID) tags as part of a comprehensive software lifecycle. As instantiated in the International Organization for Standardization/International Electrotechnical

Best Practices for Privileged User PIV Authentication

April 21, 2016
Author(s)
Hildegard Ferraiolo, David Cooper, Andrew R. Regenscheid, Karen Scarfone, Murugiah P. Souppaya
The Cybersecurity Strategy and Implementation Plan (CSIP), published by the Office of Management and Budget (OMB) on October 30, 2015, requires that federal agencies use Personal Identity Verification (PIV) credentials for authenticating privileged users

Burning Velocities of Marginally Flammable Refrigerant-Air Mixtures

April 21, 2016
Author(s)
John Pagliaro, Gregory T. Linteris
Refrigerant working fluids have been predicted to be large contributors to the increase in radiative forcing of the earth. Consequently, existing compounds will soon be phased out. Low-GWP replacements exist, but they tend to be mildly flammable, and there

Configuring and Verifying Reverberation Chambers for Testing Cellular Wireless Devices

April 21, 2016
Author(s)
Catherine A. Remley, Jos N. Dortmans, Catherine Weldon, Thomas B. Meurs, Chih-Ming Wang, Christopher L. Holloway, Perry F. Wilson
Reverberation chambers provide a repeatable test environment for laboratory over-the-air testing and represent a viable solution for testing large-form-factor wireless devices. Such tests often involve “imperfect chamber” configurations in which the
Displaying 29001 - 29025 of 143806
Was this page helpful?