The term "Mobile ID" can conjure up several different interpretations. In the strictest sense, it may consist of an un-tethered device used to capture one or more biometric samples from a subject. The captured data sample(s) may then be compared to other samples contained in a database resident on that device. The data may also be transmitted to and compared to samples in a central repository or an onboard computer repository located in a nearby vehicle. Such vehicles may include jurisdictional police cars, border patrol vehicles, military combat vehicles such as Humvees1, etc. This scenario...
The term "Mobile ID" can conjure up several different interpretations. In the strictest sense, it may consist of an un-tethered device used to capture...
The Standards Services Division (SSD) within the National Institute of Standards and Technology (NIST) publishes information related to standards and conformity assessment as a service to producers and users of such systems-both in the government and in the private sector. This report provides a basic introduction to the U.S. standards system; explains what is meant by the term, "documentary standard;" and provides an overview of the U.S., international and regional standards systems. In addition, it describes the principles used in effective standards development efforts.
The Standards Services Division (SSD) within the National Institute of Standards and Technology (NIST) publishes information related to standards and ...
This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget...
This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), P...
The ability to automatically collect more and better measurements of roadway assets (e.g., existence, condition, location, type) and to accurately map both geometry and elements of roadway assets is an important mitigating factor in roadway safety. This information serves numerous purposes including verification of road design codes, detecting degradation in roadway elements, detecting roadside hardware and clutter changes which impact safety (e.g., sight lines), creation of a roadway element inventory, analysis of accident data correlated to roadway inventory, and simulation of roadway...
The ability to automatically collect more and better measurements of roadway assets (e.g., existence, condition, location, type) and to accurately map...
Karen Scarfone Paul Hoffman National Institute of Standards and Tech
This document seeks to assist organizations in understanding the capabilities of firewall technologies and firewall policies. It provides practical guidance on developing firewall policies and selecting, configuring, testing, deploying, and managing firewalls.
This document seeks to assist organizations in understanding the capabilities of firewall technologies and firewall policies. It provides practical gu...
Elham Tabassi Patrick Grother National Institute of Standards and Tech
Performance of biometric recognition systems degrades substantially as quality of the input samples drops. Although only a small fraction of input data are of poor-quality, the bulk of recognition errors can be attributed to poor-quality samples. If quality can be improved, either by sensor design, by user interface design, or by standards compliance, better performance can be realized. For those aspects of quality that cannot be designed-in, an ability to analyze the quality of a live sample is needed. This is useful primarily in initiating the reacquisition from a user, but also for the...
Performance of biometric recognition systems degrades substantially as quality of the input samples drops. Although only a small fraction of input dat...
Facial recognition algorithms from seven commercial providers, and three universities, were tested on one laboratory dataset and two operational face recognition datasets, one comprised of visa images, the other law enforcement mugshots. The population represented in these sets approaches 4 million, such that this report documents the largest public evaluation of face recognition technology to date. The project attracted participation from a majority of the known providers of FR technology including the largest commercial suppliers.
Facial recognition algorithms from seven commercial providers, and three universities, were tested on one laboratory dataset and two operational face ...
Mircea D. Grigoriu National Institute of Standards and Tech
Probabilistic models are developed for directional wind speeds in hurricane, thunderstorm, and synoptic wind storms. The models, calibrated to data, are used to generate synthetic directional wind speeds over periods of arbitrary length and to assess the uncertainty in the resulting extreme wind speeds. The procedure for generating data uses MATLAB functions, called dirihurricane, bootstrapipar, and bootstrapiparits, and available on www.nist.gov/wind. The synthetic data generated by the models and MATLAB functions developed in this study provide a rational tool for constructing synthetic...
Probabilistic models are developed for directional wind speeds in hurricane, thunderstorm, and synoptic wind storms. The models, calibrated to data, a...
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. To strengthen the resilience of this infrastructure, President Obama issued Executive Order 13636 (EO), "Improving Critical Infrastructure Cybersecurity," on February 12, 2013.1 This Executive Order calls for the development of a voluntary Cybersecurity Framework ("Framework") that provides a "prioritized, flexible, repeatable, performance-based, and cost-effective approach" to manage cybersecurity risk for those processes, information, and systems directly involved in the...
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. To strengthen the resilience o...