Last updated on 2024-10-01T21:34:23+00:00 by LN Anderson Human Cell & Tissue Response to HCoV-229E Infection Proteomics (ACS-JM-DP2) The purpose of this experiment was to evaluate the human host response to wild-type Human coronavirus strain 229E (HCoV-229E) infection. Sample data was obtained for...
Filter results
Category
- (-) National Security (26)
- Scientific Discovery (328)
- Biology (219)
- Earth System Science (138)
- Human Health (106)
- Integrative Omics (72)
- Microbiome Science (44)
- Computational Research (25)
- Computing & Analytics (15)
- Chemistry (10)
- Energy Resiliency (10)
- Chemical & Biological Signatures Science (9)
- Data Analytics & Machine Learning (9)
- Weapons of Mass Effect (9)
- Computational Mathematics & Statistics (7)
- Materials Science (7)
- Visual Analytics (6)
- Renewable Energy (5)
- Atmospheric Science (4)
- Coastal Science (4)
- Data Analytics & Machine Learning (4)
- Ecosystem Science (4)
- Plant Science (3)
- Cybersecurity (2)
- Distribution (2)
- Electric Grid Modernization (2)
- Energy Efficiency (2)
- Energy Storage (2)
- Grid Cybersecurity (2)
- Solar Energy (2)
- Bioenergy Technologies (1)
- Computational Mathematics & Statistics (1)
- Grid Analytics (1)
- High-Performance Computing (1)
- Subsurface Science (1)
- Terrestrial Aquatics (1)
- Transportation (1)
- Wind Energy (1)
Content type
Tags
- Synthetic (5)
- Predictive Phenomics (3)
- Proteomics (3)
- Cybersecurity (2)
- Electrical energy (2)
- Homo sapiens (2)
- Label-Free Quantitation (2)
- Limited Proteolysis (2)
- RNA-Seq (2)
- TA1 (2)
- TA2 (2)
- A. pittii SO1 (1)
- Data inventory (1)
- Droughts (1)
- EBC (1)
- Exhaled Breath Condensate (1)
- High-Performance Computing (1)
- Host Immune Response (1)
- Lethal Human Viruses (1)
- Machine Learning (1)
- Mass Spectrometry (1)
- Mass spectrometry data (1)
- Multi-Omics (1)
- Omics (1)
- PerCon SFA (1)
- Photoaffinity Probe Labeling (1)
- Predictive Modeling (1)
- Quantification (1)
- Sorgoleone Catabolism (1)
- TMT (1)
Last updated on 2024-09-27T16:50:31+00:00 by LN Anderson High-density Lipoprotein (HDL) Structure and Function The purpose of this experiment was to investigate how the interactions between APOA1 and APOA2 on the surface of high-density lipoproteins (HDL) impact particle function. Interactions were...
This data is supplementary to the manuscript Expanding the access of wearable silicone wristbands in community-engaged research through best practices in data analysis and integration by Lisa M. Bramer, Holly M. Dixon, David J. Degnan, Diana Rohlman, Julie B. Herbstman, Kim A. Anderson, and Katrina...
Extreme weather events, including fires, heatwaves(HWs), and droughts, have significant impacts on earth, environmental, and power energy systems. Mechanistic and predictive understanding, as well as probabilistic risk assessment of these extreme weather events, are crucial for detecting, planning...
HDF5 file containing 10,000 hydraulic transmissivity inputs and the corresponding hydraulic pressure field outputs for a two-dimensional saturated flow model of the Hanford Site. The inputs are generated by sampling a 1,000-dimensional Kosambi-Karhunen-Loève (KKL) model of the transmissivity field...
Last updated on 2024-09-17T15:49:08+00:00 by LN Anderson PerCon SFA: Profiling sorghum-microbe interactions with a specialized photoaffinity probe identifies key sorgoleone binders in Acinetobacter pitti Mass spectrometry-based global proteome analysis and SoDA-PAL photoaffinity probe labeled...
This dataset includes one baseline and three cybersecurity based scenarios utilizing the IEEE 9 Bus Model. This instantiation of the IEEE 9 model was built utilizing the OpalRT Simulator ePhasorsim module, with Bus 7 represented by hardware in the loop (HiL). The HiL was represented by two SEL351s...
ProxyTSPRD profiles are collected using NVIDIA Nsight Systems version 2020.3.2.6-87e152c and capture computational patterns from training deep learning-based time-series proxy-applications on four different levels: models (Long short-term Memory and Convolutional Neural Network), DL frameworks...
This dataset includes the results of high-fidelity, hardware in the loop experimentation on simulated models of representative electric and natural gas distribution systems with real cyber attack test cases. Such datasets are extremely important not only in understanding the system behavior during...
Biomedical Resilience & Readiness in Adverse Operating Environments (BRAVE) Project: Exhaled Breath Condensate (EBC) TMT Proteomic Transformation Data Exhaled breath condensate (EBC) represents a low-cost and non-invasive means of examining respiratory health. EBC has been used to discover and...
This year’s VAST Challenge focuses on visual analytics applications for both large scale situation analysis and cyber security. We have two mini-challenges to test your analytical skills and confound your visual analytics applications. In the first mini-challenge, (the imaginary) BankWorld's largest...
Category
The VAST 2010 Challenge consisted of three mini-challenges (MC) and one Grand Challenge (GC). Each MC had a data set, instructions and a number of questions to be answered. The GC required participants to pull together information from all three data sets and write a debrief summarizing the...
Category
The VAST 2009 Challenge scenario concerned a fictitious, cyber security event. An employee leaked important information from an embassy to a criminal organization. Participants were asked to discover the identity ofthe employee and the structure of the criminal organization. Participants were...
Category
Mini Challenge 1: Wiki Editors The Paraiso movement is controversial and is having considerable social impact in a specific area of the world. We have extracted a segment of the Paraiso (the movement) Wikipedia edits page. Please note this is not the Paraiso Manifesto Wiki page which is part of the...
Category
It is Fall of 2004 and one of your analyst colleagues has been called away from her current tasks to an emergency. The boss has given you the assignment of picking up her investigation and completing her task. She has been asked to pursue a line of investigation into some unexpected activities...