U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

81 results found

In situ thermography of the metal bridge structures fabricated for the 2018 Additive Manufacturing Benchmark Test Series (AM-Bench 2018)

Data provided by  National Institute of Standards and Technology

These measurements were performed as part of the 2018 Additive Manufacturing Benchmark Test Series (AM-Bench). This dataset and the associated experiments are part of a continuing series of controlled benchmark tests, in conjunction with a conference series, with two initial goals, 1) to allow modelers of Additive Manufacturing processes to test their simulations against rigorous, highly controlled additive manufacturing benchmark test data, and 2) to encourage additive manufacturing practitioners to develop novel mitigation strategies for challenging build scenarios.

Tags: additive manufacturing,benchmark tests,AMBench,AMBench 2018,powder bed fusion,nickel super alloy 625,IN625,thermography,cooling rate,temperature,

Modified: 2024-02-22

Views: 0

Hydrogen-Deuterium Exchange Mass Spectrometry (HDX-MS) Centroid Data measured between 3.6 degrees C and 25.4 degrees C for the Fab Fragment of NISTmAb

Data provided by  National Institute of Standards and Technology

The spreadsheet file reported herein provides centroid data, descriptive of deuterium uptake, for the Fab Fragment of NISTmAb (PDB: 5K8A) reference material, as measured by the bottom-up hydrogen-deuterium exchange mass spectrometry (HDX-MS) method. The protein sample was incubated in deuterium-rich solutions under uniform pH and salt concentrations between 3.6 degrees C and 25.4 degrees C for seven intervals ranging (0 to 14,400) s plus a control sample that simulates a Fab Fragment immersed for infinite time in D2O.

Tags: hydrogen-deuterium exchange,hydrogen exchange,HDX-MS,interlaboratory comparison,mass spectrometry,peptide,precision,proteomics,reference material,repeatability,reproducibility,

Modified: 2024-02-22

Views: 0

Variation of Surface Topography in Laser Powder Bed Fusion Additive Manufacturing of Nickel Super Alloy 625

Data provided by  National Institute of Standards and Technology

This dataset provides surface height data from nickel super alloy 625 experiment samples built through laser powder bed fusion additive manufacturing. The experiment methodically varied part position and orientation relative to the build plate and recoater blade and details of the experiment and dataset are available in a Journal of Research at NIST article.

Tags: additive manufacturing,focus variation,IN625,Laser Powder Bed Fusion,nickel super alloy 625,surface texture,surface topography,

Modified: 2024-02-22

Views: 0

NIST DART-MS Forensics Database (is-CID)

Data provided by  National Institute of Standards and Technology

The NIST DART-MS Forensics Database is an evaluated collection of in-source collisionally-induced dissociation (is-CID) mass spectra of compounds of interest to the forensics community (e.g. seized drugs, cutting agents, etc.). The is-CID mass spectra were collected using Direct Analysis in Real-Time (DART) Mass Spectrometry (MS), either by NIST scientists or by contributing agencies noted per compound. The database is provided as a general-purpose structure data file (.SDF).

Tags: Standard reference data,mass spectra,Ion Fragmentation,mass spectrometry,NIST Mass Spectral Libraries,Chemical Identification,Biosciences and Health,Security and Forensics,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-train

Data provided by  National Institute of Standards and Technology

Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-test

Data provided by  National Institute of Standards and Technology

Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-holdout

Data provided by  National Institute of Standards and Technology

Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-test

Data provided by  National Institute of Standards and Technology

Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-holdout

Data provided by  National Institute of Standards and Technology

Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-feb2021-train

Data provided by  National Institute of Standards and Technology

Round 4 Train DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0