*.csv (zip)

Cloud forensics is different than digital forensics because of the architectural implementation of the cloud. In an Infrastructure as a Service (IaaS) cloud model. Virtual Machines (VM) deployed over the cloud can be used by adversaries to carry out a cyber-attack using the cloud as an environment.

Categories:
2317 Views

The dataset includes information on the user testing results of the study about the effectiveness mesuerement odf the use of static maps and
their banded versions. The main variables are (quantitative) : Completion time and success rates and quantitative (number of votes about the effectiveness of each map).

Categories:
116 Views

DevicePure.com is the large free repository for device specifications website, with the Manuals, Documents of devices, and applications available on the Internet.

It provides Samsung Firmware update for all Samsung smartphone devices. The database includes over 60.000 firmware update information of Samsung and describes updates with 79 languages.

Categories:
733 Views

Industrial Internet of Things (IIoTs) are high-value cyber targets due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions.

Categories:
3848 Views

Dataset I mainly consists of 30 subjects, which are respectively composed of gait data collected by mobile phone placed on arm, wrist, hand, waist, and ankle. This dataset is used to verify the impact of the mobile phone's placement on the recognition effect. Dataset II and Dataset III are composed of 113 subjects. Dataset II is the data collected from a mobile phone placed in the hand position, while Dataset III is the gait data collected from a mobile phone placed in the waist position. These two data sets are used primarily to verify the identification effect of the proposed model.

Categories:
421 Views

Human activity recognition (HAR) has been one of the most prevailing and persuasive research topics in different fields for the past few decades. The main idea is to comprehend individuals’ regular activities by looking at bits of knowledge accumulated from people and their encompassing living environments based on sensor observations. HAR has a great impact on human-robot collaborative work, especially in industrial works. In compliance with this idea, we have organized this year’s Bento Packaging Activity Recognition Challenge.

Last Updated On: 
Sat, 07/31/2021 - 02:40
Citation Author(s): 
Sayeda Shamma Alia, Kohei Adachi, Paula Lago, Nazmun Nahid, Haru Kaneko, Sozo Inoue

The dataset contains 4600 samples of 12 different hand-movement gestures. Data were collected from four different people using the FMCW AWR1642 radar. Each sample is saved as a CSV file associated with its gesture type.

Categories:
3295 Views

The AOLAH databases are contributions from Aswan faculty of engineering to help researchers in the field of online handwriting recognition to build a powerful system to recognize Arabic handwritten script. AOLAH stands for Aswan On-Line Arabic Handwritten where “Aswan” is the small beautiful city located at the south of Egypt, “On-Line” means that the databases are collected the same time as they are written, “Arabic” cause these databases are just collected for Arabic characters, and “Handwritten” written by the natural human hand.

Categories:
939 Views

Human Activity Recognition (HAR) is the process of handling information from sensors and/or video capture devices under certain circumstances to correctly determine human activities. Nowadays, several simple and automatic HAR methods based on sensors and Artificial Intelligence platforms can be easily implemented.

In this challenge, participants are required to determine the nurse care daily activities by utilizing the accelerometer data collected from the smartphone, which is the cheapest and easy-to-implement way in real life.

Last Updated On: 
Wed, 06/30/2021 - 21:50
Citation Author(s): 
Sayeda Shamma Alia, Kohei Adachi, Paula Lago, Le Nhat Tan, Haru Kaneko, Sozo Inoue

The dataset consists of 751 videos, each containing the performance one of the handball actions out of 7 categories (passing, shooting, jump-shot, dribbling, running, crossing, defence). The videos were manually extracted from longer videos recorded in handball practice sessions. 

Categories:
1104 Views

Pages