.zip

Date fruit data sets are not publicly available. Previous studies have collected and used their own data set. Almost all these studies have few hundred images per class. As our motive was robust date fruit classification, we did not use the camera to take images of a particular size, angle or images with a particular background, instead to add robustness, we built our date fruit database using Google search engine. Hence the images had the multi-background, noise, different lighting condition, other objects, different packaging and sometimes even partial covering.

Categories:
2117 Views

Lists of file hashes used in SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering

Categories:
333 Views

This is the LVSiM simulator files

Categories:
410 Views

We have included the code of protocol verification for ProVerif (in .pv format) and Scyther (in .spdl format) in the “Supplementary Materials” (Supplementary-Materials.pdf) of the revised manuscript. Essentially, the .pdf file of the “Supplementary Materials” includes: A. The source code for the protocol verifier Scyther (in .spdl format); and B. The source code for the protocol verifier ProVerif (in .pv format).

Categories:
99 Views

image files and origin files for manuscript entitled "Effect of Solid Particles on the Loss Circulation of Drilling Fluid: A Numerical Simulation"

Categories:
79 Views

This dataset is benchmark dataset we use in our research for Intrusion Detection System.

Categories:
2726 Views

It is possible to construct "aerosol cytometers" based on different types of Zhulanov's laser  aerosol counters | diffusion aerosol spectrometers (DAS) [1-8] and "hydrosol cytometers" based on hydrosol particle counters (adopted for ocean marine, ocean and hydrothermal conditions [9,10]).

Categories:
480 Views

These datasets were generated in a computer network environment where eXfiltration Advanced Persistent Threats were launched against a number of high-value targets.

It is the alert log of the Security Onion SIEM which aggregates alerts from network and host-based intrusion detection systems that are securing the network environment.

Categories:
427 Views

This folder contains the code and datasets necessary for performing experiments on the Steimann and Defects4J coverage matrices detailed in "Doric: Foundations for Statistical Fault Localisation". See the README.txt inside the folder for further details.

Categories:
97 Views

There are two types of data: raw EEG data recorded from the Brain-Vision system and Mat file converted by BBCI-Tool Box.

Categories:
243 Views

Pages