Machine Learning

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
3942 Views

Unmanned aerial vehicles (UAVs) are being used for various applications, but the associated cyber risks are also increasing. Machine learning techniques have been successfully adopted to develop intrusion detection systems (IDSs). However, none of the existing works published the cyber or physical datasets that have been used to develop the IDS, which hinders further research in this field.

Categories:
3037 Views

The extended bandit learning game algorithm can search the best solution for the hybrid discrete-continuous strategy space. At each learning time, the player can quickly decide based on a finite discrete strategy pool, thereby improving the learning efficiency.

Categories:
42 Views

The dataset contains a collection of V2X (Vehicle-to-Everything) messages for classification, prioritization, and spam message detection. It comprises 1,000 messages with varying message types, content, priorities, and spam labels. The messages are sourced from different vehicles with specific destination vehicles or broadcast to all vehicles. They cover various message types, including traffic updates, emergency alerts, weather notifications, hazard warnings, roadwork information, and spam messages. The priority of the messages is categorized as either high, medium, or low.

Categories:
1235 Views

The rapid growth of interconnected IoT devices has introduced complexities in their monitoring and management. Autonomous and intelligent management systems are essential for addressing these challenges and achieving self-healing, self-configuring, and self-managing networks. Intelligent agents have emerged as a powerful solution for autonomous network design, but their dynamic and intelligent management requires processing large volumes of data for training network function agents.

Categories:
81 Views

Translator   Translator   Translator   

Categories:
145 Views

SYPHAX dataset was collected from Tunisia in “Sfax” city, the second largest Tunisian city after the capital. A total of 2008 images were gathered through manual collection one by one, with each image energizing text detection challenges in nature according to real existing complexity of 15 different routes (downtown, Nasryia, Sidi Mansour, Sakiet Ezziet, Sakiet Eddayer, Mahdia road, Tunis main road, Chehia, Taniour, Lafran, Elayn, Gremda, Manzel Chaker, Matar route, Gabes road) along with ring roads, intersections and roundabouts.

Categories:
281 Views

The e-nose device used in this study was constructed using a gas sensor array, LCD display, micro air pumps for inhalation and exhalation, a microcontroller, and a mini-PC. Gas samples from the sample chamber were periodically drawn into the device through a hose. Each sample underwent a 30-hour sampling process at room temperature (25°C). The sampling frequency was 15 times per hour, resulting in 60 records per sample.

Categories:
829 Views

The following keywords are used to create this database- 

Categories:
203 Views

This dataset consists of high-resolution visible-spectrum (RGB) and thermal infrared (TIR) images of two vineyards (Vitis vinifera L.) with varieties of Mouhtaro and Merlot, which was captured by Unmanned Aerial Vehicle (UAV) carrying TIR and RGB sensors three times in a cultivation period.

Categories:
942 Views

Pages