U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

69 results found

Data and code for the paper, "Inverse Transform Sampling for Efficient Doppler-Averaged Spectroscopy Simulations"

Data provided by  National Institute of Standards and Technology

This dataset represents the results of calculations of atomic absorption spectra for the case of two-color EIT. We compare computation methods, specifically Gaussian sampling, to find that one sampling method converges to smooth transmittance curves in less time than the other. We also include some example scripts which generate and plot the figure data.

Tags: Rydberg atoms,atomic physics,receivers,fields strength,electric field,volts/meter,

Modified: 2024-02-22

Views: 0

Per- and polyfluoroalkyl substances (PFAS) Interferents List

Data provided by  National Institute of Standards and Technology

A table of known interferences for per- and polyfluoroalkyl substances using mass spectrometry.

Tags: per- and polyfluoroalkyl substances,PFAS,mass spectrometry,analytical chemistry,high-resolution mass spectrometry,HRMS,LC-MS/MS,

Modified: 2024-02-22

Views: 0

Supplemental Data and Source Code for ILSA Research

Data provided by  National Institute of Standards and Technology

Source code associated with the Inverted Library Search Algorithm (ILSA) for identifying mixture components using is-CID mass spectra. This source code is frozen to accompany the manuscript titled "Updates to the Inverted Library Search Algorithm for mixture analysis" by Moorthy et. al.

Tags: mass spectrometry,Mixture Analysis,Search Algorithms,seized drug analysis,

Modified: 2024-02-22

Views: 0

Rydberg state engineering: A comparison of tuning schemes for continuous frequency sensing

Data provided by  National Institute of Standards and Technology

On-resonance Rydberg atom-based radio-frequency (RF) electric field sensing methods remain limited by the narrow frequency signal detection bands available by resonant transitions. The use ofan additional RF tuner field to dress or shift a target Rydberg state can be used to return a detuned signal field to resonance and thus dramatically extend the frequency range available for resonantsensing.

Tags: Rydberg atoms,atomic physics,receivers,fields strength,electric field,volts/meter,

Modified: 2024-02-22

Views: 0

Modeling Line Broadening and Distortion Due to Inhomogeneous Fields for Rydberg Electrometry

Data provided by  National Institute of Standards and Technology

This set corresponds to a (pending) publication, where we attempt to model spectral features appearing in the lab by calculating many segments of an inhomogeneous field. Every data set here is a transmission value, either normalized to 1 in modeled data, or an arbitrary-scaled voltage reading from a photodiode onto an oscilloscope. These are given in scans over coupling photon detuning, delta_C, which is divided by 2 pi, and given in MHz. Arrays are scans over delta_C, and position/fieldstrength, for figure 3.

Tags: Rydberg atoms,atomic physics,receivers,fields strength,electric field,volts/meter,

Modified: 2024-02-22

Views: 0

FCpy: Feldman-Cousins Confidence Interval Calculator

Data provided by  National Institute of Standards and Technology

Python scripts and Python+Qt graphical user interface for calculating Feldman-Cousins confidence intervals for low-count Poisson processes in the presence of a known background and for Gaussian processes with a physical lower limit of 0.

Tags: python,SIMS,statistics,mass spectrometry,Confidence Interval,CI,Feldman,Cousins,Poisson,Gaussian,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-test

Data provided by  National Institute of Standards and Technology

Round 9 Test DatasetThis is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-holdout

Data provided by  National Institute of Standards and Technology

Round 9 Holdout DatasetThis is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - object-detection-jul2022-train

Data provided by  National Institute of Standards and Technology

Round 10 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained on the COCO dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers. This dataset consists of 144 AI models using a small set of model architectures.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - rl-lavaworld-jul2023-train

Data provided by  National Institute of Standards and Technology

Round rl-lavaworld-jul2023-train Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of Reinforcement Learning agents trained to navigate the Lavaworld Minigrid environment. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0