*.avi; *.csv; *.txt

AirForce Security Dataset (AFSD) that offers many advantages over the AWID dataset for detecting Evil Twin attacks. The AFSD dataset was created through a carefully planned and executed simulation of an Evil Twin attack considering the characteristics of both the attacks and the WiFi environment.

Categories:
533 Views

The closed form model to calculate the charge density and surface potential in an N-polar GaN/AlGaN heterostructure is presented. The proposed model is developed from the solution of Schrodinger’s equation for a finite triangular potential well. The results from our model are validated with numerical data for a wide range of bias conditions, channel layer thickness and spacer layer mole fraction. Finally, the gate capacitance of the heterostructure is evaluated using automatic differentiation and validated against experimental data.

Categories:
25 Views

The closed form model to calculate the charge density and surface potential in an N-polar GaN/AlGaN heterostructure is presented. The proposed model is developed from the solution of Schrodinger’s equation for a finite triangular potential well. The results from our model are validated with numerical data for a wide range of bias conditions, channel layer thickness and spacer layer mole fraction. Finally, the gate capacitance of the heterostructure is evaluated using automatic differentiation and validated against experimental data.

Categories:
Views

This dataset was created by following these steps. First, online reviews of HMD VR devices are collected and refined. Second, variables are deduced from previous studies, and then appropriate keyword candidates for the deduced variables are selected. Topic modeling is conducted to examine whether the deduced variables sufficiently represent all the reviews, and other variables are added if necessary.

Categories:
117 Views

Horticulture crop recommendation in saline soils

Categories:
164 Views

10 soccer supporters gathered to watch a live broadcasted Premier League
match between Liverpool and Manchester United (4 - 0) on 19th of March 2022, all
equipped with wrist-worn accelerometers. All participants were aware of the purpose of this experiment and consented to participate
by attendance at the event, and by wearing the accelerometer. No personally sensitive
information was collected, all data is fully anonymised following the GDPR guidelines
and all procedures were in accordance with the recommendations of the data protection

Categories:
151 Views

The rocket nose-cone shapes have been generated by blending few conic sections together (two conic sections in one) and the simulated against mach number regime from subsonic through transonic to supersonic. The aerodynamic drag coefficients have been recoded for each shape for each mach number.

Categories:
531 Views

A comparative, empirical study of state-of-the-art contrastive and generative graph learning models applied to source and binary software fragments drawn from the National Vulnerability Database (NVD) reveals that Graph Masked Auto-Encoders show exceptional promise for detecting security vulnerabilities, outperforming all other baseline models in the study.

Categories:
13 Views

In traditional schemes, obtaining a robust topology requires high connectivity. We chose random undirected and directed network topologies for comparison to showcase the

advantages of entropy and connectivity.

Categories:
92 Views

This is a fictional data set, provided by the IBM. These data set contains atmost 30 features of categorical and discreet data. These data are kind of both numerical and text values which help in analysing the employee data from hiring to firing and on boarding to attrition. 

Categories:
5523 Views

Pages