Skip to main content

Dataset Search

Displaying 8065 - 8088 of 8240 results

Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time.

Categories:

The frequency domain measurement of the scattering parameter, S21, of the wireless channel was carried out using the ZVB14 Vector Network Analyzer (VNA) from Rhode and Schwartz. The measurement system consists of the VNA, low loss RF cables, and omnidirectional antennas at the transmitter and receiver ends. The transmitter and receiver heights were fixed at 1.5 m. A program script was written for the VNA to measure 10 consecutive sweeps: each sweep contains 601 frequency sample points with spacing of 0.167 MHz to cover a 100 MHz band centered at 2.4 GHz.

Categories:

There are no explicit labelled errors in FB15K. Considering the experience that most errors in real-world KG derive from the misunderstanding between similar entities, we consider the methods described in paper "DoesWilliamShakespeareREALLYWrite Hamlet? Knowledge Representation Learning with Confidence" to generate fake triples as negative examples automatically with less human annotation. Three kinds of fake triples may be constructed for each true triple: one by replacing head entity, one by replacing relationship, and one by replacing tail entity.

Categories:

The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things. In particular, Computational Radio Frequency Identification (CRFID) devices are an emerging class of battery-free, computational, sensing enhanced devices that harvest all of their energy for operation.

Categories:

The dataset contains several publicly available Bug Bounty Program policy documents collected from the internet.

These were used to develop the theory of Bug Bounty Program practices.

Categories:

The file contains two arrays:

 

InCondSim: the initial conditions of the combustion system organized as C3H8, C2H5, CH3, O2, C3H7, HO2, H7C3, CH4, HH, H2, OO, OH, H2O, HO2, H2O2, C2H4, C3H6, C3H5, CH2O, HCO, MM, CH3O, C2H6, C2H3, C2H2, C2H, CO, CH2, CO2.

 

peakPWR: the peak power generated by the combustion.

Categories:

For reproducibility purposes, a large test bench of fiber links is simulated to test the Baseband Subcarrier Sweep framework and associated monitoring techniques. The test bench comprises three sets of 1000 fiber links each containing one, two, or three faults.

Categories:

This zip folder contains audio files for experiments reported in "Acoustic Feedback Cancelation in Hearing Aids Using Dual Adaptive Filtering and Gain-Controlled Probe Signal", submitted for publication in IEEE Access.

Categories:

Mp3 is a very popular audio format and hence it can be a good host for carrying hidden messages. Therefore, different steganography methods have been proposed for mp3 hosts. UnderMp3Cover is one of such algorithms and has some important advantage over other comparable methods. First, the popular steganography method mp3stego, works directly on non-compressed samples. Therefore, using covers that have been compressed before could lead to serious degradation of its security. UnderMp3Cover does not have this important limitation.

Categories:

This database consists of the data used for the 2018 IEEE Signal Processing Cup.  This iteration of the Signal Processing Cup was a forensic camera model identification challenge.  Teams of undergraduate students were tasked with building a system capable of determining type of camera (manufacturer and model) that captured a digital image without relying on metadata.

Categories:

This dataset includes  the Channels Switch Sequences of 300 IPTV viewers in Guangzhou, P.R. China, in Augest, 2014. There are 4 columns in the file, which represent viewer ID, the current channel number, the next channel number, the date of the month, respectively. The first column, the ID code of a viewer, ranks in descent with the times the viewer watched tv channels. The more times a viewer watches tv channels, the bigger the ID is. In a day, the rows are time series and generated step by step as the real watching tv behavior. 

 

 

Categories:

This dataset includes  the Channels Switch Sequences of 300 IPTV viewers in Guangzhou, P.R. China, in Augest, 2014.

There are 4 columns in the file, which represent viewer ID, the current channel number, th next channel number, the date of the month, respectively.

The first column, the ID code of a viewter, ranks with the times the viewer watched tv channels. The more times a viewer watches tv channels, the bigger

the ID is. In a day, the rows are time series and generated step by step as the real watching tv behavior. 

 

 

 

Categories:

The software industry is a very flexible phenomenon. Adding network concepts to this industry means we have countless actors with different roles on a single ground. Its players include software developers, customers, users, and software components. The purpose of this article is to create a better way to communicate between these actors.We can imagine software engineering different and more effective than the current situation.

Categories:

The electronic system has been design to know the position human body. Of this way the system use a three axis accelerometer to detect five common positions (i) ventral decubitus, (ii) right lateral decubitus, (iii) left lateral decubitus, (iv) supine decubitus and (v) seated.  The sensor data was acquire with ten diferrents persons, their each positions was  how they felt confortable. The accelerometer acquire data from  3 axis possible (X,Y,Z)

Categories: