*.zip

A Course on Literature Searching/Compiling/Understanding for Support of Research/Projects

Categories:
74 Views

This dataset contains the ontologies and instruments developed in the MIIDAS Project

Categories:
58 Views

<p>The dataset comprises 2035 images from 14 different software architectural patterns (100+ images each), viz., Broker, Client Server, Microkernel, Repository, Publisher-Subscriber, Peer-to-Peer, Event Bus, Model View Controller, REST, Layered, Presentation Abstraction Controller, Microservices, and Space-based patterns.</p>

Categories:
617 Views

A qualitative and quantitative extension of the chaotic models used to generate self-similar traffic with long-range dependence (LRD) is presented by means of the formulation of a model that considers the use of piecewise affine onedimensional maps. Based on the disaggregation of the temporal series generated, a valid explanation of the behavior of the values of Hurst exponent is proposed and the feasibility of their control from the parameters of the proposed model is shown.

Categories:
156 Views

This dataset contains (1) the Simulink model of a three-phase photovoltaic power system with passive anti-islanding protections like over/under current (OUC), over/under voltage (OUV), over/under frequency (OUF), rate of change of frequency (ROCOF), and dc-link voltage and (2) the results in the voltage source converter and the point of common coupling of the photovoltaic system during islanding operation mode and detection times of analyzed anti-islanding methods.

Categories:
1613 Views

This article explores the required amount of time series points from a high-speed computer network to accurately estimate the Hurst exponent. The methodology consists in designing an experiment using estimators that are applied to time series addresses resulting from the capture of high-speed network traffic, followed by addressing the minimum amount of point required to obtain in accurate estimates of the Hurst exponent.

Categories:
332 Views

Datasets as described in the research paper "Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Applications".

There are two main dataset provided here, firstly is the data relating to the initial training of the machine learning module for both normal and malicious traffic, these are in binary visulisation format, compresed into the document traffic-dataset.zip.

Categories:
5370 Views

Files supplement_20-TIE-2530_Matlab.zip and supplement_20-TIE-2530_Modelsim.zip complement the publication under the title "A Direct Modulation for Matrix Converters based on the One–cycle Atomic operation developed in Verilog HDL", which is under review process.

Categories:
343 Views

本研究中使用的柑橘叶数据集来自 PlantVillage [24],用于以下方面的开放访问公共资源: 与农业有关的内容。数据集包括三种类型柑桔叶片:柑桔健康,柑桔HLB(黄龙病) 一般,柑橘HLB严重。原始数据集包含4577张柑橘叶片图像,分为三部分 分类

Categories:
1078 Views

Pages