U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Dataset Search

Search results

62 results found

Nestor: a toolkit for quantifying tacit maintenance knowledge, for investigatory analysis in smart manufacturing

Data provided by  National Institute of Standards and Technology

There is often a large amount of maintenance data already available for use in Smart Manufacturing systems, but in a currently-unusable form: service tickets and maintenance work orders (MWOs). Nestor is a toolkit for using Natural Language Processing (NLP) with efficient user-interaction to perform structured data extraction with minimal annotation time-cost.

Tags: information,communication,maintenance,tribal knowledge,event sequences,training,machine learning,data cleaning,prognostics,diagnostics,visualization,decision guidance,CMMS,scheduling,investigations,nestor,smart manufacturing,manufacturing operations,manufacturing performance,

Modified: 2024-02-22

Views: 0

REMI: Resource for Materials Informatics

Data provided by  National Institute of Standards and Technology

The REsource for Materials Informatics (REMI) will host a diverse collection of scripting notebooks (Jupyter, Matlab LiveScripts, etc.) for collecting, pre-processing, analyzing, and visualizing materials data. Notebooks are curated using tags aligned to Materials Science and Data Science topics. REMI emerged from the realization that both experts and novices wanted examples of using machine learning for science. Meanwhile, lots of experts are developing digital notebooks (e.g. Jupyter) to demonstrate step-by-step data collection, pre-processing, analysis and visualization.

Tags: machine learning,data analysis,data processing,materials science,materials genome initiative,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-train

Data provided by  National Institute of Standards and Technology

Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-test

Data provided by  National Institute of Standards and Technology

Round 2 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-aug2020-holdout

Data provided by  National Institute of Standards and Technology

Round 2 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform a variety of tasks (image classification, natural language processing, etc.). A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-test

Data provided by  National Institute of Standards and Technology

Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-dec2020-holdout

Data provided by  National Institute of Standards and Technology

Round 3 Holdout DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-feb2021-train

Data provided by  National Institute of Standards and Technology

Round 4 Train DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0

Dark solitons in BECs dataset 2.0

Data provided by  National Institute of Standards and Technology

Atomic Bose-Einstein condensates (BECs) are widely investigated systems that exhibit quantum phenomena on a macroscopic scale. For example, they can be manipulated to contain solitonic excitations including conventional solitons, vortices, and many more. Broadly speaking, solitonic excitations are solitary waves that retain their size and shape and often propagate at a constant speed. They are present in many systems, at scales ranging from microscopic, to terrestrial and even astronomical.

Tags: machine learning,Bose-Einstein condensates,dark solitons,

Modified: 2024-02-22

Views: 0

Trojan Detection Software Challenge - image-classification-feb2021-test

Data provided by  National Institute of Standards and Technology

Round 4 Test DatasetThe data being generated and disseminated is the test data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs trained to perform image classification. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

Tags: Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;,

Modified: 2024-02-22

Views: 0