U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

86 results found

RGTM 10169

Data provided by  National Institute of Standards and Technology

NIST developed a reference material consisting of synthetic fragments of the SARS-CoV-2 virus RNA, which is the target of molecular diagnostic tests. These RNA fragments can assist in the development and validation of RT-qPCR assays for the detection SARS-CoV-2. The RNA fragments are characterized for concentration using digital PCR methods, may be used to assess limits of detection for SARS-CoV-2 assays, and may calibrate other in-house or commercial SARS-CoV-2 controls. This dataset includes data used for RTGM 10169 SARs-Cov-2 Research Grade Test Material validation.

Tags: virus,SRM,reference material,DNA,sequencing,PCR,digital PCR,Biosciences and Health,

Modified: 2024-02-22

Views: 0

Cost Assessment Tool for Sustainable Manufacturing (CATS)

Data provided by  National Institute of Standards and Technology

This tool uses techniques from ASTM E3200 for evaluating manufacturing investments from the perspective of environmentally sustainable manufacturing by pairing economic methods of investment analysis with environmental aspect of manufacturing. The economic techniques used include net present value, internal rate of return, payback period, and hurdle rate. These four techniques are deterministic, meaning that they deal with known values that are certain. The tool also conducts a sensitivity analysis using Monte Carlo techniques.

Tags: investment analysis,manufacturing,net present value,internal rate of return,environmental impact,sustainability,

Modified: 2024-02-22

Views: 0

Linear Axis Testbed at IMS Center - Run-to-Failure Experiment 01

Data provided by  National Institute of Standards and Technology

A linear axis testbed at the Center for Intelligent Maintenance Systems (IMS Center) at the University of Cincinnati was run to failure (the detection of backlash) over one year with periodic data collected from an inertial measurement unit (IMU) on the carriage, two triaxial accelerometers on the ball nut, and the controller.

Tags: manufacturing,Industry 4.0,smart manufacturing,linear axis,machine tool,ball screw,backlash,sensor,accelerometer,inertial measurement unit,IMU,error motion,data analysis,monitoring,diagnostics,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-test

Data provided by  National Institute of Standards and Technology

Round 9 Test DatasetThis is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-summary-jan2022-holdout

Data provided by  National Institute of Standards and Technology

Round 9 Holdout DatasetThis is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform one of three tasks, sentiment classification, named entity recognition, or extractive question answering on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Simantha: Simulation for Manufacturing

Data provided by  National Institute of Standards and Technology

Simantha is a discrete event simulation package written in Python that is designed to model the behavior of discrete manufacturing systems. Specifically, it focuses on asynchronous production lines with finite buffers. It also provides functionality for modeling the degradation and maintenance of machines in these systems. Classes for five basic manufacturing objects are included: source, machine, buffer, sink, and maintainer. These objects can be defined by the user and configured in different ways to model various real-world manufacturing systems.

Tags: discrete-event simulation,manufacturing,production,maintenance,python,

Modified: 2024-02-22

Views: 0

NIST CAD Models and STEP Files with PMI

Data provided by  National Institute of Standards and Technology

NIST has created a Test System to measure conformance of Computer-Aided Design (CAD) software to American Society of Mechanical Engineers (ASME) standards for Product and Manufacturing Information (PMI), specifically geometric dimensioning and tolerancing (GD&T) information. The test system includes: test case definitions (2D CAD drawings with PMI), CAD models generated from the test cases, STEP files generated from the CAD models, and verification and validation reports.

Tags: manufacturing,CAD,PMI,interoperability,data exchange,

Modified: 2024-02-22

Views: 0

Datasets from an interlaboratory comparison to characterize a multi-modal polydisperse sub-micrometer bead dispersion

Data provided by  National Institute of Standards and Technology

These four data files contain datasets from an interlaboratory comparison that characterized a polydisperse five-population bead dispersion in water. A more detailed version of this description is available in the ReadMe file (PdP-ILC_datasets_ReadMe_v1.txt), which also includes definitions of abbreviations used in the data files. Paired samples were evaluated, so the datasets are organized as pairs associated with a randomly assigned laboratory number.

Tags: Biosciences and Health,particle,protein particle,sub-micrometer particle,subvisible particle,particle tracking analysis,resonant mass measurement,electrical sensing zone,holographic particle characterization,flow imaging,laser diffraction,flow cytometry,

Modified: 2024-02-22

Views: 0

STEP File Analyzer and Viewer Software

Data provided by  National Institute of Standards and Technology

The STEP File Analyzer and Viewer is a software tool that generates a spreadsheet or a set of CSV (comma-separated value) files from a STEP (ISO 10303 Standard for Exchange of Product model data) Part 21 file. STEP files are used to represent product and manufacturing information (PMI) and for data exchange and interoperability between Computer-Aided Design (CAD), Manufacturing (CAM), Analysis (CAE), and Inspection (CMM) software related to the smart manufacturing digital thread. STEP is also used for the long-term archiving and retrieval of product data.

Tags: manufacturing,interoperability,conformance,CAD,CAE,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - nlp-question-answering-sep2021-train

Data provided by  National Institute of Standards and Technology

Round 8 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform extractive question answering (QA on English text. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0