HDF5 file containing 10,000 hydraulic transmissivity inputs and the corresponding hydraulic pressure field outputs for a two-dimensional saturated flow model of the Hanford Site. The inputs are generated by sampling a 1,000-dimensional Kosambi-Karhunen-Loève (KKL) model of the transmissivity field...
Filter results
Category
- (-) Computing & Analytics (15)
- (-) Coastal Science (4)
- (-) Solar Energy (2)
- (-) High-Performance Computing (1)
- (-) Wind Energy (1)
- Scientific Discovery (309)
- Biology (200)
- Earth System Science (136)
- Human Health (104)
- Integrative Omics (74)
- Microbiome Science (42)
- Computational Research (25)
- National Security (22)
- Chemistry (10)
- Energy Resiliency (10)
- Data Analytics & Machine Learning (9)
- Computational Mathematics & Statistics (7)
- Materials Science (7)
- Visual Analytics (6)
- Chemical & Biological Signatures Science (5)
- Renewable Energy (5)
- Weapons of Mass Effect (5)
- Atmospheric Science (4)
- Data Analytics & Machine Learning (4)
- Ecosystem Science (4)
- Plant Science (3)
- Cybersecurity (2)
- Distribution (2)
- Electric Grid Modernization (2)
- Energy Efficiency (2)
- Energy Storage (2)
- Grid Cybersecurity (2)
- Bioenergy Technologies (1)
- Computational Mathematics & Statistics (1)
- Grid Analytics (1)
- Subsurface Science (1)
- Terrestrial Aquatics (1)
- Transportation (1)
Content type
Tags
- Synthetic (5)
- Energy Equity (2)
- Energy Storage (2)
- Data inventory (1)
- Droughts (1)
- Energy Burden (1)
- Energy Justice (1)
- Extreme weather (1)
- Fires (1)
- Heatwaves (1)
- High-Performance Computing (1)
- Machine Learning (1)
- ML/AI (1)
- Predictive Modeling (1)
- Renewable Energy (1)
- Solar photovoltaics (1)
- Weatherization (1)
This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities.
Category
Datasets
1
This data is a model of synthetic adversarial activity surrounded by noise and was funded by DARPA. The various versions include gradually more complex networks of activities.
Category
Datasets
1
Category
Datasets
1
Category
Datasets
7
Category
Datasets
1
PNNL’s Vision Statement for Equity in the Power Grid Drawing from a wealth of interdisciplinary research in grid modernization, PNNL is spearheading an effort to advance equity and energy justice through the role of scientific research with the goal of building an advanced national power grid...
Datasets
2
The Human Islet Research Network (HIRN) is a large consortia with many research projects focused on understanding how beta cells are lost in type 1 diabetics (T1D) with a goal of finding how to protect against or replace the loss of functional beta cells. The consortia has multiple branches of...
Category
Datasets
1
This data was generated by the organization IvySys. Activities can be phone calls, transactions, or any other type of communications. Most of the files are of the type .edges, .rdf, or .csv; but all can be opened in a text editor. A good introduction to this data can be found in \Tutorial1\MAA...
Category
Dataset The dataset will consist of: About 1200 news stories from the Alderwood Daily News plus a few other items collected by the previous investigators A few photos A few maps of Alderwood and vicinity (in bitmap image form) A few files with other mixed materials, e.g. a spreadsheet with voter...
Category
It is Fall of 2004 and one of your analyst colleagues has been called away from her current tasks to an emergency. The boss has given you the assignment of picking up her investigation and completing her task. She has been asked to pursue a line of investigation into some unexpected activities...
Category
Mini Challenge 1: Wiki Editors The Paraiso movement is controversial and is having considerable social impact in a specific area of the world. We have extracted a segment of the Paraiso (the movement) Wikipedia edits page. Please note this is not the Paraiso Manifesto Wiki page which is part of the...
Category
The VAST 2009 Challenge scenario concerned a fictitious, cyber security event. An employee leaked important information from an embassy to a criminal organization. Participants were asked to discover the identity ofthe employee and the structure of the criminal organization. Participants were...
Category
The VAST 2010 Challenge consisted of three mini-challenges (MC) and one Grand Challenge (GC). Each MC had a data set, instructions and a number of questions to be answered. The GC required participants to pull together information from all three data sets and write a debrief summarizing the...
Category
This year’s VAST Challenge focuses on visual analytics applications for both large scale situation analysis and cyber security. We have two mini-challenges to test your analytical skills and confound your visual analytics applications. In the first mini-challenge, (the imaginary) BankWorld's largest...