artificial intelligence
Overview
The dataset under consideration is a comprehensive compilation of code snippets, function descriptions, and their respective binary representations aimed at fostering research in software engineering. It contains a variety of code functionalities and serves as a valuable resource for understanding the behavior and characteristics of C programs. This data is sourced from the AnghaBench repository, a well-documented collection of C programs available on GitHub.
Columns and Data Types
- Categories:
The Narrative question answering (QA) problem involves generating accurate, relevant, and human-like answers to questions based on the comprehension of a story consisting of logically connected paragraphs. However, this problem remains unexplored for the Arabic language because of the lack of Arabic narrative datasets. To address this gap, we present the Arabic-NarrativeQA dataset, which is the first dataset specifically designed for machine-reading comprehension of Arabic stories.
- Categories:
This research introduces the Open Seizure Database and Toolkit as a novel, publicly accessible resource designed to advance non-electroencephalogram seizure detection research. This paper highlights the scarcity of resources in the non-electroencephalogram domain and establishes the Open Seizure Database as the first openly accessible database containing multimodal sensor data from 49 participants in real-world, in-home environments.
- Categories:
Sentiment analysis, which aims to identify the positive or negative tone of a given text, has seen a surge in interest over the past two decades, making it one of the most studied areas of study in the fields of Natural Language Processing and Information Extraction. Due to the ambiguous nature of sarcasm, however, sarcasm detection is an essential part of sentiment analysis. The task becomes exceedingly challenging when applied to a language with a more intricate morphology and a lack of available resources, such as Telugu.
- Categories:
This dataset is made for traditional, machine learning, and deep neural-network-based virtual sensor development and evaluation.
- Categories:
Gorakhpur is a city located in the north-eastern region of
Uttar Pradesh state of India. It is a sub-part of Purvanchal
region of Uttar Pradesh and Bihar. In the south-western
part, Gorakhpur periphery spreads along Rapti river. In
the north-western region, Gorakhpur shares its periphery
with Chillua Tal. In the southern part, Ramgarh Tal with a
perimeter of 18 km is located.
Water Bodies:
+ Ramgarh Tal is a historically important heritage site and
is also a tourist attraction; spread over 700 hectares of
- Categories:
This data collection focuses on capturing user-generated content from the popular social network Reddit during the year 2023. This dataset comprises 29 user-friendly CSV files collected from Reddit, containing textual data associated with various emotions and related concepts.
- Categories:
FormAI is a novel AI-generated dataset comprising 112,000 compilable and independent C programs. All the programs in the dataset were generated by GPT-3.5-turbo using dynamic zero-shot prompting technique and comprises programs with varying levels of complexity. Some programs handle complicated tasks such as network management, table games, or encryption, while others deal with simpler tasks like string manipulation. Each program is labelled based on vulnerabilities present in the code using a formal verification method based on the Efficient SMT-based Bounded Model Checker (ESBMC).
- Categories:
This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.
- Categories: