6 results found
Filters applied: Hydropower, Quantum Information Sciences, Systems Integration & Deployment
NOVEMBER 18, 2022

Machine Learning Engineering

Machine learning engineering is a branch of engineering that implements ongoing data science developments to address complicated or intricate problems with large amounts of disparate data to create cost-effective and far-reaching benefits.
SEPTEMBER 7, 2022

Fish Passage

Fish passage refers to the ability to effectively and efficiently allow fish to move through a water system, including successfully navigating human-made structures like dams and culverts, which can impede their journey.
FEBRUARY 15, 2022

Quantum Information Science

At the intersection between quantum mechanics and computer and information science lies at quantum information science (QIS). QIS seeks to understand how information is processed and transmitted using quantum mechanical principles. It is the merger of quantum mechanics and information and computation theory. QIS comprises four major areas: quantum computing, quantum communication, quantum sensing, and quantum foundational science.
JANUARY 3, 2022

Cyber Resilience

Cyber resilience, which is also sometimes referred to as cyber resiliency, is the ability to weather adverse events in a computing environment. The National Institute of Standards and Technology (NIST) defines cyber resilience as “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.” Cyber resilience applies to both physical and virtual assets.
DECEMBER 10, 2021

Critical Infrastructure Protection

Americans rely on critical infrastructures to protect the nation, maintain a strong economy, and enhance quality of life. These infrastructures—which include the electrical power grid, transportation systems, information networks, banking and finance systems, manufacturing and distribution, and more—are evolving and modernizing. They have become increasingly complex, connected, and vulnerable to adverse conditions, such as cyber and physical attacks.