Machine Learning

(Work in progress)

This dataset contains the augmented images and the images & segmentation maps for seven handwashing steps, six of which are prescirbed WHO handwashing steps.

This work is based on a sample handwashing video dataset uploaded by Kaggle user real-timeAR.

Categories:
317 Views

To improve the applicability and generalizability of ML/DL-related SE studies, we conducted a 12-year Systematic Literature Review (SLR) on 1,428 ML/DL-related SE papers published between 2009 and 2020. Our trend analysis demonstrated the impacts that ML/DL brought to SE. We examined the complexity of applying ML/DL solutions to SE problems and how such complexity led to issues concerning the reproducibility and replicability of ML/DL studies in SE.

Categories:
211 Views

Owing to increased biosecurity and industrial demands, the poultry houses in Taiwan are generally nonopen and closed types, with automatic environmental control and sensor equipment gradually being installed in such houses. Environmental sensors and poultry health monitoring systems are necessary to improve poultry feeding efficiency and safety. In this work, we developed a goose surface temperature monitoring system based on deep learning using visible image and integrated with infrared thermal image.

Categories:
217 Views

<p>Features of each news according to seven credibility categories</p>

Categories:
467 Views

It is important for network operators to carry out traffic and application characterization to gain insights into the activity of their networks. Several studies proposed methods that extract features from network traffic to characterize it, or to classify the application that produced it, based on a ?man in the middle? network interception point that can analyze the entire network traffic of an organization.

Categories:
522 Views

The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules.

Categories:
7533 Views

Any work using this dataset should cite this paper as follows:

Nirmalya Thakur and Chia Y. Han, "Country-Specific Interests towards Fall Detection from 2004–2021: An Open Access Dataset and Research Questions", Journal of Data, Volume 6, Issue 8, pp. 1-21, 2021.

Abstract

Categories:
1805 Views

The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established.

Categories:
11491 Views

In this paper, the daily price data of constituents of the S&P 500 index, which dates from 2005 to 2021, are selected to train and test by the RNN model. 

Categories:
95 Views

Using Wi-Fi IEEE 802.11 standard, radio frequency waves are mainly used for communication on various devices such as mobile phones, laptops, and smart televisions. Apart from communication applications, the recent research in wireless technology has turned Wi-Fi into other exploration possibilities such as human activity recognition (HAR). HAR is a field of study that aims to predict motion and movement made by a person or even several people.

Categories:
4288 Views

Pages