The electric power system of a deep space vehicle is mission-critical, and needs to respond to faults intelligently and autonomously. 

An algorithm to determine the optimal operation of such a system is presented in the paper: P. Kulkarni, D. Aliprantis, B. Loop and N. Wu, 'Autonomous Power Dispatch for a Deep Space Vehicle Power System,' Proc. 2020 IEEE Power and Energy Conf. at Illinois (PECI), Champaign, IL.

This dataset contains the complete information about the system used in the case studies in this paper. 

Categories:
88 Views

This dataset was used in the article "Dias-Audibert FL, Navarro LC, de Oliveira DN, Delafiori J, Melo CFOR, Guerreiro TM, Rosa FT, Petenuci DL, Watanabe MAE, Velloso LA, Rocha AR and Catharino RR (2020) Combining Machine Learning and Metabolomics to Identify Weight Gain Biomarkers. Front. Bioeng. Biotechnol. 8:6. doi: 10.3389/fbioe.2020.00006", open access available at: https://doi.org/10.3389/fbioe.2020.00006.

Instructions: 

WGMSML-Data folder contains the mass spectra input data for the Matlab scripts which are in WGMSML-MATLAB-SourceCode folder. WGMSML-ExecutionLogsAndPlots contains logs and plots generated by the execution of the Matlab code over the input data. Main scripts are enumerated in the order of execution.

Categories:
958 Views

This dataset refers to the case study performed in the paper "A Real Options Market-Based Approach to Increase Penetration of Renewables", submitted to IEEE Transactions on Smart Grid. The file contains the Midcontinent ISO data used for the day-ahead prices, as well as the wind data from NREL's Wind Integration National Dataset Toolkit which was used to estimate the renewable productions in the case study.

Categories:
183 Views

Mp3 is a very popular audio format and hence it can be a good host for carrying hidden messages. Therefore, different steganography methods have been proposed for mp3 hosts. UnderMp3Cover is one of such algorithms and has some important advantage over other comparable methods. First, the popular steganography method mp3stego, works directly on non-compressed samples. Therefore, using covers that have been compressed before could lead to serious degradation of its security. UnderMp3Cover does not have this important limitation.

Instructions: 

The archive file “Mp3_Decoder” contains some codes for decoding and reading frames of mp3 files into Matlab. You need to decompress the archive before using the codes.

Upon decompression, the resulting folder would contain an executable file, a folder named “tables” and the Matlab wrapper for communication between Matlab environment

and the executable part. Please, make sure that you copy all of these material to your current address and do not make any change to the name of “tables” folder. 

Please, refer to “Main_Frame_Decoder.m” for an example on running the codes.

 

 

The folder “Multiple_ReEmbeding_Feature_Extraction” contains the codes for proposed feature extraction. First, you should use the codes in “Mp3_Decoder” folder and

import sideinfo of your mp3 files in Matlab, then use the provided codes for feature extraction.Please, refer to “Main_Feat_Extraction.m” for an example on running the codes.

 

 

The archive file “Ump3C” contains some codes for message hiding/extraction in the Matlab environment. Investigating Ump3C method shows that only global gain of mp3

bit stream get changed in the embedding process, therefore, our code is only a simulation of the process and does not produce an mp3 file in the output.

In other words, these codes would only generate sideinfo corresponding to the stego files, but it would not mux sideinfo and MDCT back, it would not produce 

bit stream of stego file and it would not write the bitstream into an output file. It is noteworthy that from steganalysis point of view, we don’t need the output 

bit stream of Ump3c and sideinfo of stego file would suffice. In order to run the codes, you need to decompress the archive. Upon decompression, the resulting folder 

would contain an executable file, a folder named “tables” and some Matlab codes for simulating the message hiding/extraction procedures. Please, make sure that you 

copy all of these material to your current address and do not make any change to the name of “tables” folder. Please, refer to “Main.m” for an example on running the codes.

 

Fore more information please refer to the following article:

Hamzeh Ghasemzade, "Multi-layer architecture for efficient steganalysis of UnderMp3Cover in multi-encoder scenario", IEEE Transactions on Information Forensics and Security, 2018.

 

 

 

Categories:
335 Views