Dataset Search
Sort By
Search results
601 results found
Linear Axis Testbed at IMS Center - Run-to-Failure Experiment 01
Data provided by National Institute of Standards and Technology
A linear axis testbed at the Center for Intelligent Maintenance Systems (IMS Center) at the University of Cincinnati was run to failure (the detection of backlash) over one year with periodic data collected from an inertial measurement unit (IMU) on the carriage, two triaxial accelerometers on the ball nut, and the controller.
Tags: manufacturing,Industry 4.0,smart manufacturing,linear axis,machine tool,ball screw,backlash,sensor,accelerometer,inertial measurement unit,IMU,error motion,data analysis,monitoring,diagnostics,
Modified: 2025-04-06
PION: Password-based IoT Onboarding Over Named Data Networking
Data provided by National Institute of Standards and Technology
This library implements a secure device onboarding protocol for Named Data Networking using SPAKE2 and NDNCERT. It contains three components corresponding to the roles defined in the protocol: device, authenticator, certificate authority.
Tags: Named Data Networking,Information Centric Networking,internet of things,
Modified: 2025-04-06
Automated Streams Analysis for Public Safety (ASAPS) Dataset (v0.75)
Data provided by National Institute of Standards and Technology
The ASAPS Dataset includes eight continuous hours of data from across a fictitious ASAPS City representative of a normal day in a small city. The dataset includes multiple data types - video, audio, text, sensor, social media. The video data was created from a series of staged events, and then synchronized and augmented with recorded audio, simulated data for sensor, text, and social media related to the variety of emergency events across the city. The dataset represents a geographic area of approximately 68 square blocks.
Tags: artificial intelligence technologies,real-time analytics,emergency event detection,heterogenous data analysis,streaming data,UI/UX,data interface,public safety operations,situation awareness,resource deployment,communications systems of the future,state-of-the-art artificial intelligence,real-time computing,communications,data optimization,multimodal information analysis and visualization,decision management,advanced information visualization,user interface,and user experience,
Modified: 2025-04-06
Universal Cyber-Physical Systems Environment for Federation (UCEF)
Data provided by National Institute of Standards and Technology
Internet of Things (IoT) is comprised of interacting networks of physical, computational, and human components that coordinate to fulfill time-sensitive functions in their environment. The development of these systems spans all industrial sectors and demands collaborative effort between research and development teams from multiple institutions. Realizing the full potential of IoT requires interoperability between heterogeneous systems and development processes supported by robust platforms for experimentation and testing across domains.
Tags: co-simulation,cyber-physical systems,high level architecture,internet of things,modeling and simulation,tool integration,
Modified: 2025-04-06
Data set for Amontons-Coulomb-like slip dynamics in acousto-microfluidics
Data provided by National Institute of Standards and Technology
This data set contains the data/information used to plot the graphs published in the 2022 Nat. Comm. article (titled "Amontons-Coulomb-like slip dynamics in acousto-microfluidics") of authors A. Quelennec, J.J. Gorman and D.R. Reyes.
Tags: Local viscous pressure,coefficient of transmission,acoustic loss,slip,viscosity,density,acoustic resistance,mass fraction,contact angle,
Modified: 2025-04-06
Data for "Restricted Domain Compressive Sensing for Antenna Metrology" to be submitted to IEEE Transactions on Signal Processing.
Data provided by National Institute of Standards and Technology
This dataset contains CSV files for the figures in the paper titled "Restricted Domain Compressive Sensing for Antenna Metrology".
Tags: compressive sensing; far-field pattern; near-field pattern; antenna characterization; Wigner d-functions; SVD,
Modified: 2025-04-06
Trojan Detection Software Challenge - nlp-summary-jan2022-test
Data provided by National Institute of Standards and Technology
Round 9 Test DatasetThis is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - nlp-summary-jan2022-holdout
Data provided by National Institute of Standards and Technology
Round 9 Holdout DatasetThis is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,
Modified: 2025-04-06
Trojan Detection Software Challenge - nlp-summary-jan2022-train
Data provided by National Institute of Standards and Technology
Round 9 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Tags: Trojan Detection,Artificial Intelligence,ai,machine learning,Adversarial Machine Learning,
Modified: 2025-04-06
Data for Modeling OFDM Communication Signals with Generative Adversarial Networks
Data provided by National Institute of Standards and Technology
This repository contains results for experiments on generative modeling of synthetic Orthogonal-Frequency Division Multiplexing (OFDM) communication signals. (This record supersedes Software and Data for Modeling OFDM Communication Signals with Generative Adversarial Networks, formerly at https://doi.org/10.18434/mds2-2428)
Tags: generative adversarial network,machine learning,wireless communications,
Modified: 2025-04-06