U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

47 results found

SRM 3287 Blueberry (Fruit)

Data provided by  National Institute of Standards and Technology

SRM 3287 Blueberry (Fruit). This Standard Reference Material (SRM) is intended primarily for use in validating analytical methods for the determination of organic acids and nutrients in blueberries and similar materials. This SRM can also be used for quality assurance when assigning values to in-house control materials. A unit of SRM 3287 consists of five packets, each containing approximately 5 g of freeze-dried, powdered fruit. This data is public in the Certificate of Analysis for this material.

Tags: Standard Reference materials,SRM,SRM 3287,blueberry,food,nutrition,dietary supplement,anthocyanin,certified value,reference value,Food and Nutrition,

Modified: 2024-02-22

Views: 0

SRM 3290 Dry Cat Food

Data provided by  National Institute of Standards and Technology

SRM 3290 Dry Cat Food - This Standard Reference Material (SRM) is intended primarily for use in validating methods for determining proximates, fatty acids, vitamins, elements, and amino acids in dry cat food and similar matrices. This SRM can also be used for quality assurance when assigning values to in-house control materials. This SRM is a blend of commercially available dry cat foods. A unit of SRM 3290 consists of five heat-sealed, aluminized pouches, each containing approximately 10 g of material. This data is public in the Certificate of Analysis for this material.

Tags: Standard Reference Material,SRM,SRM 3290,dry cat food,certified values,reference values,food,nutrition,Food and Nutrition,

Modified: 2024-02-22

Views: 0

SRM 3532 Calcium-Containing Solid Oral Dosage Form

Data provided by  National Institute of Standards and Technology

SRM 3532 Calcium-Containing Solid Oral Dosage Form - This Standard Reference Material (SRM) is intended primarily for validation of methods for determining cholecalciferol (vitamin D3) and elements in a calcium dietary supplement and similar materials. This SRM can also be used for quality assurance when assigning values to in-house reference materials. A unit of SRM 3532 consists of five packets, each containing approximately 10 g of material. This data is public in the Certificate of Analysis for this material.

Tags: Standard Reference materials,SRM,SRM 3532,calcium supplement,food,nutrition,dietary supplements,certified value,reference value,Food and Nutrition,

Modified: 2024-02-22

Views: 0

Certified values of iodine in CRMs of food matrices in mg/kg units. The uncertainties are expanded uncertainties at approximately 95% confidence.

Data provided by  National Institute of Standards and Technology

A comparison of the expanded uncertainty for certified values of iodine in food matrix CRMs. The CRMS were found by searching The European Virtual Institute for Speciation Analysis (EVISA) database using the terms "Iodine" and "Certified" in the Material category. The uncertainties are expanded uncertainties at approximately 95% confidence.

Tags: food,nutrition,dietary supplements,Standard Reference materials,reference materials,SRM,RM,Food and Nutrition,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-train

Data provided by  National Institute of Standards and Technology

Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-test

Data provided by  National Institute of Standards and Technology

Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-holdout

Data provided by  National Institute of Standards and Technology

Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-test

Data provided by  National Institute of Standards and Technology

Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-holdout

Data provided by  National Institute of Standards and Technology

Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-feb2021-train

Data provided by  National Institute of Standards and Technology

Round 4 Train DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0