Showing 1 - 15 of 26

PerCon SFA, Co-Investigator Vivian Lin earned her PhD in organic chemistry from the University of California, Berkeley with Professor Chris Chang, developing fluorescent probes for imaging redox active small molecules. Afterward, she traveled to Switzerland for a postdoctoral fellowship in the...

The IONTOF TOF.SIMS 5 data source is a time-of-flight secondary ion mass spectrometer and powerful surface analysis tool used to investigate scientific questions in biological, environmental, and energy research. Among the most sensitive of surface analysis tools, it uses a high-vacuum technique...

Washington State University Distinguished Graduate Research Program Program: Chemical Engineering WSU-PNNL Advisor: Aaron Wright
Biography Dr. Mary Lipton is currently a Staff Scientist at the Pacific Northwest National Laboratory and Adjunct Professor at Washington State University-Tri-Cities in Richland and Adjunct Professor in the Institute for Biological Chemistry and Washington State University Pullman. She is nationally...

Category

Chris received his Bachelor of Science degree in chemistry at the University of Colorado at Colorado Springs in 2005. He attained his PhD in chemistry at the University of Illinois at Urbana–Champaign in 2011, under Mary L. Kraft, where his graduate work focused on using secondary ion mass...

Category

This dataset includes one baseline and three cybersecurity based scenarios utilizing the IEEE 9 Bus Model. This instantiation of the IEEE 9 model was built utilizing the OpalRT Simulator ePhasorsim module, with Bus 7 represented by hardware in the loop (HiL). The HiL was represented by two SEL351s...

ProxyTSPRD profiles are collected using NVIDIA Nsight Systems version 2020.3.2.6-87e152c and capture computational patterns from training deep learning-based time-series proxy-applications on four different levels: models (Long short-term Memory and Convolutional Neural Network), DL frameworks...

MPLEx Method Protocol for Integrative Single-Sample Processing for Subsequent Proteomic, Metabolomic, and Lipidomic Analyses The Metabolite, Protein and Lipid Extraction (MPLEx) method protocol is a robust sample processing technique applicable to a breadth of diverse sample types, including various...

This dataset includes the results of high-fidelity, hardware in the loop experimentation on simulated models of representative electric and natural gas distribution systems with real cyber attack test cases. Such datasets are extremely important not only in understanding the system behavior during...

Biomedical Resilience & Readiness in Adverse Operating Environments (BRAVE) Project: Exhaled Breath Condensate (EBC) TMT Proteomic Transformation Data Exhaled breath condensate (EBC) represents a low-cost and non-invasive means of examining respiratory health. EBC has been used to discover and...

The Biomedical Resilience & Readiness in Adverse Operating Environments (BRAVE) Project develop new capabilities to improve health and performance of first responders in adverse operating environments common to national defense. The BRAVE project analyze biological samples, collect physiological...
  1. Datasets

    1

Exhaled breath condensate proteomics represent a low-cost, non-invasive alternative for examining upper respiratory health. EBC has previously been used for the discovery and validation of detected exhaled volatiles and non-volatile biomarkers of disease related to upper respiratory system distress...

This year’s VAST Challenge focuses on visual analytics applications for both large scale situation analysis and cyber security. We have two mini-challenges to test your analytical skills and confound your visual analytics applications. In the first mini-challenge, (the imaginary) BankWorld's largest...

The VAST 2010 Challenge consisted of three mini-challenges (MC) and one Grand Challenge (GC). Each MC had a data set, instructions and a number of questions to be answered. The GC required participants to pull together information from all three data sets and write a debrief summarizing the...

The VAST 2009 Challenge scenario concerned a fictitious, cyber security event. An employee leaked important information from an embassy to a criminal organization. Participants were asked to discover the identity ofthe employee and the structure of the criminal organization. Participants were...