An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Dana Chisnell, Sharon J. Laskowski, Karen Bachmann, Svetlana Z. Lowry
In this paper, we discuss our efforts to develop a repeatable test protocol for assessing usability for poll workers – temporary election officials who ensure
Buddhika Hapuwatte, Ashley Hartwell, Matthew Triebe, Abheek Chatterjee, Nehika Mathur, Daniel Figola, KC Morris
High Density Polyethylene (HDPE) is a highly recyclable thermoplastic comprising 17% of all plastic produced. Yet, demand for recycled HDPE (r-HDPE) has outrun
Nehika Mathur, Thomas Maani, Chuanbing Rong, John Sutherland
The push to decarbonize has spurred the demand for clean energy technologies such as electric vehicles (EVs) and wind turbines (WTs). These technologies rely on
Jon R. Pratt, Stephan Schlamminger, Dalziel Wilson, Charles Condos, Aman Rajendra Agrawal, Christian Pluchar
We derive a nonlinear equation of motion for a chip-scale pendulum comprising a thick plate suspended from a tensioned nanoribbon. Recently we explored the use
Bryce Primavera, Saeed Khan, Samuel Adler, Jeff Shainline
Superconducting optoelectronic hardware is promising for large-scale neuromorphic computing. In this work, analog circuits combining Josephson junctions and
From basics of Fabry-Perot (FP) resonator and roundtrip phase, a complete working equation for a FP cavity based optical pressure standard (OPS) is derived and
7 The fire modeling community is actively working to develop the tools needed to quantitatively predict material 8 and product flammability behavior (e.g
This paper proposes a distributed Green Network Optimization (GNO) with Multi-Agent Reinforcement Learning (MARL). GNO-MARL combines: (a) Network Utility
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols
Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all the
Prem Rachakonda, Kamel S. Saidi, Marek Franaszek, Helen Qiao, John Sweetser, Armin Khatoonabadi, David Dechow, Wesley Rhodes
NIST is leading and supporting multiple efforts to develop standards for 3D imaging systems for manufacturing automation applications. Many manufacturers
Ground-source integrated heat pumps (GSIHPs) can save energy in residential buildings by providing all the heating, ventilation, air-conditioning (HVAC), and
Nowrin Akter Surovi, Paul Witherell, Kumara Sundar, Vinay Saji Mathew
Additive Manufacturing (AM) is becoming increasingly popular in academia and industry due to its cost-effectiveness and time-saving benefits. However, AM faces
Charpy V-notch testing of metallic materials involves application of kilonewton-range force pulses on millisecond time scales, generated by impacting the
Marek Franaszek, Prem Rachakonda, Pavel Piliptchak, Kamel S. Saidi
Segmenting images containing many objects stacked in unstructured piles is a challenging and vital task in robotic bin picking applications. Objects in such
Milos Drobnjakovic, Perawit Charoenwut, Ana Nikolov, Hakju Oh, Boonserm Kulvatunyou
Machine Learning (ML) adoption is on the rapid rise, with a nearly 40% compound annual growth rate over the next decade. In other words, companies will be
Dreyelian Morejon, Jon Montalban, Eneko Iradier, Mohamed Hany, Rick Candell, Pablo Angueira
This paper analyzes the temporal variation of the radio propagation channel in industrial environments. The results have been obtained by processing empirical
Yan Lu, Zhuo Yang, Shengyen Li, Yaoyao Fiona Zhao, Jiarui Xie, Mutahar Safdar, Hyunwoong Ko
The key differentiation of digital twins from existing models-based engineering approaches lies in the continuous synchronization between physical and virtual
Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone
In this paper we introduce a new attack on the multivariate encryption scheme HFERP, a big field scheme including an extra variable set, additional equations of
This paper presents a network management AI assistant built with Large Language Models. It adapts at runtime to the network state and specific platform
Lejla Erdal, Ammar Gubartalla, Paulo Victor Lopes, Huizhong Cao, Guodong Shao, Per Lonnehed, Henri Putto, Abbe Ahmed, Sven Ekered, Björn Johansson
As Industry 4.0 technology is still evolving, research and implementation gaps due to issues such as costs, security, and lack of domain expertise for enabling
Deogratias Kibira, Guodong Shao, Rishabh Venketesh, Matthew Triebe
Developing digital twins for manufacturing applications is challenging due to insufficient modeling frameworks and standardized procedures. As a result, the
Dimitris Simos, Bernhard Garn, Dominik-Philip Schreiber, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is
Amar Abane, Abdella Battou, Abderrahim Amlou, Tao Zhang
Network management relies on extensive monitoring of network state to analyze network behavior, design optimizations, plan upgrades, and conduct troubleshooting
This paper introduces a microservice-based architecture designed to enable automation of network programmability and management. Amid the complexity of today's
This paper builds upon our previous work on Network Security Traffic Analysis Platforms (NSTAP) [1], presenting an advanced framework for the real-time
We present a compressive approach for channel power measurements in coexistence scenarios involving heterogeneous cyclostationary channel usage and an example