CSV

Dockerfile plays an important role in the Docker-based containerization process, but many Dockerfile codes are infected with smells in practice. This dataset contains a collection of 6,334 projects to help developers gain some insights into the occurrence of Dockerfile smells. Those projects belong to 10 popular programming languages, i.e., Shell, Makefile, Ruby, PHP, Python, Java, HTML, CSS, JavaScript, and Go. 

Categories:
274 Views

This work focuses on using the full potential of PV inverters in order to improve the efficiency of low voltage networks. More specifically, the  independent per-phase control capability of PV three-phase four-wire inverters, which are able to inject different active and reactive powers in each phase, in order to reduce the system phase unbalance is considered.  This new operational procedure is analyzed by raising an optimization problem which uses a very accurate modelling of European low voltage networks.

Categories:
664 Views

ASNM datasets include records consisting of many features, that express various properties and characteristics of TCP communications. These features are called Advanced Security Network Metrics (ASNM) and were designed with the intention to discern legitimate and malicious connections (especially intrusions).

Categories:
6293 Views

This study was conducted in Mayaguez – Puerto Rico, and an area of around 18 Km2 was covered, which were determined using the following classification of places:

·         Main Avenues: Wide public ways that has hospitals, vegetation, buildings, on either side

·         Open Places: Mall parking lots and public plazas

·         Streets & Roads: Dense residential and commercial areas on both sides

     Vendor             Equipment                  Description      

KEYSIGHT®      N9343C                    Handheld Spectrum Analyzer

Categories:
800 Views

This dataset page is currently being updated. The tweets collected by the model deployed at https://live.rlamsal.com.np/ are shared here. However, because of COVID-19, all computing resources I have are being used for a dedicated collection of the tweets related to the pandemic. You can go through the following datasets to access those tweets:

Categories:
9193 Views

7200 .csv files, each containing a 10 kHz recording of a 1 ms lasting 100 hz sound, recorded centimeterwise in a 20 cm x 60 cm locating range on a table. 3600 files (3 at each of the 1200 different positions) are without an obstacle between the loudspeaker and the microphone, 3600 RIR recordings are affected by the changes of the object (a book). The OOLA is initially trained offline in batch mode by the first instance of the RIR recordings without the book. Then it learns online in an incremental mode how the RIR changes by the book.

Categories:
655 Views

The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this challenge, realistic protection and investigation countermeasures, such as network intrusion detection and network forensic systems, need to be effectively developed. For this purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems. Although there are several network datasets, in most cases, not much information is given about the Botnet scenarios that were used.

Categories:
20159 Views

Blended Learning has been widely used in current basic education as a new teaching model, and how to improve the acceptance of students in Blended Learning is a hot issue that needs to be solved in the practice of teaching. 

 

There is a paper for the dataset:

 

Primary science curriculum student acceptance of blended learning: structural equation modeling and visual analytics

doi: 10.1007/s40692-021-00206-8

 

Full Text: https://rdcu.be/cAooZ

 

 

Abstract

Categories:
616 Views

These are OMNeT++ flooding simulation results of four-UAV FANET in three different topologies, as mentioned in "The Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm as a Countermeasure".

Please, check the paper for more information.

Categories:
618 Views

This study seeks to obtain data which will help to address machine learning based malware research gaps. The specific objective of this study is to build a benchmark dataset for Windows operating system API calls of various malware. This is the first study to undertake metamorphic malware to build sequential API calls. It is hoped that this research will contribute to a deeper understanding of how metamorphic malware change their behavior (i.e. API calls) by adding meaningless opcodes with their own dissembler/assembler parts.

Categories:
10979 Views

Pages