*.json

Parasitic infections have been recognised as one of the most significant causes of illnesses by WHO. Most infected persons shed cysts or eggs in their living environment, and unwittingly cause transmission of parasites to other individuals. Diagnosis of intestinal parasites is usually based on direct examination in the laboratory, of which capacity is obviously limited.

Last Updated On: 
Mon, 02/26/2024 - 10:24
Citation Author(s): 
Duangdao Palasuwan, Thanarat H. Chalidabhongse, Korranat Naruenatthanaset, Thananop Kobchaisawat, Kanyarat Boonpeng, Nuntiporn Nunthanasup, Nantheera Anantrasirichai

WannaCry Bitcoin Cash-in and Cash-out payment network data in JSON along with STIX representation of address 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Categories:
686 Views

This is the dataset for the paper Bayesian Inference of Sector Orientation in LTE Networks based on End-User Measurements published at VTC 2021 - Fall.

It includes a set of Drive-Test RSRP Pathloss Measurements with their relative position to the corresponding eNodeB. In total it contains data for 91 three-sector eNodeBs, which results in  273 sectors.

Categories:
595 Views

Aspect Sentiment Triplet Extraction (ASTE) is an Aspect-Based Sentiment Analysis subtask (ABSA). It aims to extract aspect-opinion pairs from a sentence and identify the sentiment polarity associated with them. For instance, given the sentence ``Large rooms and great breakfast", ASTE outputs the triplet T = {(rooms, large, positive), (breakfast, great, positive)}. Although several approaches to ASBA have recently been proposed, those for Portuguese have been mostly limited to extracting only aspects without addressing ASTE tasks.

Categories:
526 Views

The time-to-market pressure and the continuous growing complexity of hardware designs have promoted the globalization of the Integrated Circuit (IC) supply chain. However, such globalization also poses various security threats in each phase of the IC supply chain. Although the advancements of Machine Learning (ML) have pushed the frontier of hardware security, most conventional ML-based methods can only achieve the desired performance by manually finding a robust feature representation for circuits that are non-Euclidean data. As a result, modeling these circuits using graph learning to imp

Categories:
2611 Views

This is a dataset of client-server Round Trip Time delays of an actual cloud gaming tournament run on the infrastructure of the cloud gaming company Swarmio Inc. The dataset can be used for designing algorithms and tuning models for user-server allocation and server selection. To collect the dataset, tournament players were connected to Swarmio servers and delay measurements were taken in real time and actual networking conditions.

Categories:
932 Views

As Science and technology evolve, the environment is getting affected daily. These cause major environmental issues like Global Warming, Ozone layer depletion, Natural resource depletion, etc. These are measured and regulated by local bodies. The data given by the local bodies are average values for a large area, those data might be inaccurate for a small sector or isolated zone. However, there are few techniques such as WSN (Wireless Sensor Networks), IoT (Internet of things) which measures and updates real-time data to a cloud server to overcome the trouble.

Categories:
1709 Views

The "RetroRevMatchEvalICIP16" dataset provides a retrospective reviewer recommendation dataset and evaluation for IEEE ICIP 2016. The methodology via which the recommendations were obtained and the evaluation was performed is described in the associated paper.

Y. Zhao, A. Anand, and G. Sharma, “Reviewer recommendations using document vector embeddings and a publisher database: Implementation and evaluation,” IEEE Access, vol. 10, pp. 21 798–21 811, 2022. https://doi.org/10.1109/ACCESS.2022.3151640

Categories:
280 Views

The dataset is generated by performing different MiTM attacks in the synthetic electric grid in RESLab testbed at Texas A&M University, US. The testbed primarily consists of a dynamic power system simulator (Powerworld Dynamic Studio), network emulator (CORE), Snort IDS, open DNP3 master and Elasticsearch's Packetbeat index. There are raw and processed files that can be used by security enthusiasts to develop new features and also to train IDS using our feature space respectively.

Categories:
2729 Views

These last decades, Earth Observation brought quantities of new perspectives from geosciences to human activity monitoring. As more data became available, artificial intelligence techniques led to very successful results for understanding remote sensing data. Moreover, various acquisition techniques such as Synthetic Aperture Radar (SAR) can also be used for problems that could not be tackled only through optical images. This is the case for weather-related disasters such as floods or hurricanes, which are generally associated with large clouds cover.

Categories:
12332 Views

Pages