CSV

Raman Spectra Dataset of Compressed Milk Tablet Candy, with Calcium and Vitamin A,D additives

Categories:
211 Views

Information:

This dataset was created for research on blockchain anomaly and fraud detection. And donated to IEEE data port online community. 

https://github.com/epicprojects/blockchain-anomaly-detection

 

 

 

Categories:
3080 Views

We provide a large benchmark dataset consisting of about: 3.5 million keystroke events; 57.1 million data-points for accelerometer and gyroscope each; and 1.7 million data-points for swipes. Data was collected between April 2017 and June 2017 after the required IRB approval. Data from 117 participants, in a session lasting between 2 to 2.5 hours each, performing multiple activities such as: typing (free and fixed text), gait (walking, upstairs and downstairs) and swiping activities while using desktop, phone and tablet is shared.

Categories:
10475 Views

Dockerfile plays an important role in the Docker-based containerization process, but many Dockerfile codes are infected with smells in practice. This dataset contains a collection of 6,334 projects to help developers gain some insights into the occurrence of Dockerfile smells. Those projects belong to 10 popular programming languages, i.e., Shell, Makefile, Ruby, PHP, Python, Java, HTML, CSS, JavaScript, and Go. 

Categories:
275 Views

This work focuses on using the full potential of PV inverters in order to improve the efficiency of low voltage networks. More specifically, the  independent per-phase control capability of PV three-phase four-wire inverters, which are able to inject different active and reactive powers in each phase, in order to reduce the system phase unbalance is considered.  This new operational procedure is analyzed by raising an optimization problem which uses a very accurate modelling of European low voltage networks.

Categories:
693 Views

ASNM datasets include records consisting of many features, that express various properties and characteristics of TCP communications. These features are called Advanced Security Network Metrics (ASNM) and were designed with the intention to discern legitimate and malicious connections (especially intrusions).

Categories:
6531 Views

This study was conducted in Mayaguez – Puerto Rico, and an area of around 18 Km2 was covered, which were determined using the following classification of places:

·         Main Avenues: Wide public ways that has hospitals, vegetation, buildings, on either side

·         Open Places: Mall parking lots and public plazas

·         Streets & Roads: Dense residential and commercial areas on both sides

     Vendor             Equipment                  Description      

KEYSIGHT®      N9343C                    Handheld Spectrum Analyzer

Categories:
836 Views

This dataset page is currently being updated. The tweets collected by the model deployed at https://live.rlamsal.com.np/ are shared here. However, because of COVID-19, all computing resources I have are being used for a dedicated collection of the tweets related to the pandemic. You can go through the following datasets to access those tweets:

Categories:
9580 Views

7200 .csv files, each containing a 10 kHz recording of a 1 ms lasting 100 hz sound, recorded centimeterwise in a 20 cm x 60 cm locating range on a table. 3600 files (3 at each of the 1200 different positions) are without an obstacle between the loudspeaker and the microphone, 3600 RIR recordings are affected by the changes of the object (a book). The OOLA is initially trained offline in batch mode by the first instance of the RIR recordings without the book. Then it learns online in an incremental mode how the RIR changes by the book.

Categories:
684 Views

The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this challenge, realistic protection and investigation countermeasures, such as network intrusion detection and network forensic systems, need to be effectively developed. For this purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems. Although there are several network datasets, in most cases, not much information is given about the Botnet scenarios that were used.

Categories:
21450 Views

Pages