
This dataset contains full details of the use case scenarios. Those can be used for effort elicitation using the adapted Use Case Points method. Despite the extensive use of UCP in software engineering, it has yet to be adapted for IoT systems, which is essential for project management and resource planning. Our proposed adaptation, UCP for IoT, is based on a four-layer IoT architecture and tailors the standard software UCP to the specifications of IoT systems.
- Categories:

The dataset contains detailed information on a 100kVA transformer in ONAN cooling mode. The file consists of three PDF documents, which describe the transformer’s overall structure, core structure and size, winding structure and dimension, respectively.
- Categories:
Document layout analysis (DLA) plays an important role for identifying and classifying the different regions of digital documents in the context of Document Understanding tasks. In light of this, SciBank seeks to provide a considerable amount of data from text (abstract, text blocks, caption, keywords, reference, section, subsection, title), tables, figures and equations (isolated equations and inline equations) of 74435 scientific articles pages. Human curators validated that these 12 regions were properly labeled.
- Categories:
We focus on subjective and objective Point Cloud Quality Assessment (PCQA) in an immersive environment and study the effect of geometry and texture attributes in compression distortion. Using a Head-Mounted Display (HMD) with six degrees of freedom, we establish a subjective PCQA database named SIAT Point Cloud Quality Database (SIAT-PCQD). Our database consists of 340 distorted point clouds compressed by the MPEG point cloud encoder with the combination of 20 sequences and 17 pairs of geometry and texture quantization parameters.
- Categories:
Cyber attacks are a growing concern for small businesses during COVID-19 . Be Protected While You Work. Upgrade Your Small Business's Virus Protection Today!
Before going for a Cyber security solutions for small to mid-sized businesses deliver enterprise-level protection.
Download this (Checklist for a Small Firm's Cybersecurity Program 2020-2021) data set to deploy secure functioning of various aspects of your small business including, employee data, website and more.
- Categories:

Secure cryptographic protocols are indispensable for modern communication systems. It is realized through an encryption process in cryptography. In quantum cryptography, Quantum Key Distribution (QKD) is a widely popular quantum communication scheme that enables two parties to establish a shared secret key that can be used to encrypt and decrypt messages.
- Categories:

Example axial and coronal phase maps and post-treatment MRI from 68 thalamotomies in essential tremor patients and four pallidotomies in Parkinson's disease patients. From the manuscript "Using phase data from MR temperature imaging to visualize anatomy during MRI-guided focused ultrasound neurosurgery" published in 2020 in IEEE Trans. Med. Imaging.
Normal
0
false
false
false
EN-US
X-NONE
X-NONE
- Categories: