Excel

Port scanning attack is popular method to map a remote network or identify operating systems and applications. It allows the attackers to discover and exploit the vulnerabilities in the network.

Categories:
711 Views

This dataset consists of a simulated normal distribution data having n = 500 data points and mean = 80 and standard deviation = 2.

Categories:
685 Views

该数据是锂离子电池在不同温度下的实验数据。它主要包括15°C,25°C和35°C不同温度下的实验数据。25°C下的数据集包含来自开路电压实验、HPPC实验和BBDST实验的数据,这些数据是原始数据。在15°C和35°C下处理的数据集是处理的电流和电压数据。

Categories:
504 Views

Testing Australian standard consumers’ understanding of the language used to describe wine

 

Categories:
126 Views

This dataset is the supplementary material of an IEEE RAL paper named "Design of Fully Controllable and Continuous Programmable Surface Based on Machine Learning". It includes the z-displacement data derived from the FEA simulation, voltage input data derived from Matlab, and dataset for inverse application. The detailed description can be found in that paper.

Categories:
109 Views

Biomechanics has predominantly relied upon the trajectory optimization method for the analysis and prediction of the movement of the limbs. Such approaches have paved the way for the motion planning of biped and quadruped robots as well. Most of these methods are deterministic, utilizing first-order iterative gradient-based algorithms incorporating the constrained differentiable objective functions.

Categories:
109 Views

In this data file are the ratings made by different subjects during an experiment evaluating 3 different products of two product typologies (desktop telephones and coffee makers) in three different media. In addition, their opinion about the overall evaluation of the product ("Like"), security in response and purchase decision was collected. The presence data collected is equivalent to the application of the SUS presence test.

Categories:
105 Views

CONTENTS OF THIS FILE

  •  Data Analysis
  •  Experimental Design

Data Analysis

This folder consists of data obtained from the experiments and the materials we use for analysis. Here we provide the following documents:

01-The folder "Class diagrams"

      This folder contains class diagrams realized by participants in three experiments.

02-Code.R 

Categories:
253 Views

Abstract—Chipless RFID tag decoding has some inherent degrees of uncertainty because there is no handshake protocol between chipless tags and readers. This paper initially compares the outcome of different pattern recognition methods to decode some frequency-based tags in the mm-wave spectrum. It will be shown that these pattern recognition methods suffer from almost 2 to 5% false decoding rate. To overcome this mis-decoding problem, two novel methods of making images of the chipless tags are presented.

Categories:
237 Views

This sheet contains the answers from our european Cyber Security MSc Education Survey. The data shows which knowledge units various educations in Europe cover and to which extend. We drew conclusions in the paper "Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs". The present dataset is newer and therefore extends the one we based our paper on.

Categories:
350 Views

Pages