Machine Learning

The Comprehensive Hindi Hostile Post Detection Dataset (CM-HTHPD) is collection of Twitter posts written in the Hindi language, focusing on various forms of hostile content. The dataset was gathered using the Twitter Developer API and subsequently annotated manually with sentiment labels using the Label Studio platform. The dataset is primarily aimed at facilitating research and analysis in the domain of hostile content detection and sentiment analysis in Hindi-language social media discourse. The size of the dataset is approx 8300.

Categories:
68 Views

16.00

Normal
0

false
false
false

EN-GB
X-NONE
X-NONE

Categories:
289 Views

This dataset is data support for a research paper named “Natural Gas Triethylene Glycol Dehydration Equipment Digital Twin and Condition Evaluation Application”. The paper has been submitted to IEEE Transactions on Industrial Informatics.

Categories:
92 Views

In the data set acquisition phase, the system will automatically record the following data: frontal video recording: the frame rate of the video is 10Hz per second, and the video contains the patient's movement, posture and facial information; hemodynamic data: the acquisition frequency is 10Hz per second, covering the area of the prefrontal lobe of the brain, and including the hemodynamic information of 22 channels; kinematic data: the acquisition frequency is 10Hz per second, and including the hand velocity, shoulder angular velocity, elbow angular velocity and sitting posture information

Categories:
403 Views

As the field of human-computer interaction continues to evolve, there is a growing need for new methods of gesture recognition that can be used in a variety of applications, from gaming and entertainment to healthcare and robotics. While traditional methods of gesture recognition rely on cameras or other optical sensors, these systems can be limited by factors such as lighting conditions and occlusions.

Categories:
1763 Views

The study included 50 epilepsy patients undergoing long-term video-EEG monitoring at the Epilepsy Center of Guangdong 999 Brain Hospital. The inclusion criteria for patients were as follows: (1) VEEG reports confirming definite epileptic seizures, (2) complete video data containing both seizure and non-seizure periods, (3) no intentional interference during patient seizures, and no occlusion of the patient, such as patients were covered by quilts.

Categories:
43 Views

This dataset is NOx concentration data used for training and testing support vector regression algorithms. There are two groups in total, one for offline algorithm and the other for online algorithm. This data comes from the measured data of a certain ultra supercritical coal-fired boiler under variable operating conditions. The offline model data sampling interval is 5 minutes, and the online model data sampling interval is 5 minutes.

Categories:
4 Views

The dataset comprises image files of size 640 x 480 pixels for various grit sizes of Abrasive sheets. The data collected is raw. It can be used for analysis, which requires images for surface roughness. The dataset consists of a total of 8 different classes of surface coarseness. There are seven classes viz. P80, P120, P150, P220, P320, P400, P600 as per FEPA (Federation of European Producers of Abrasives) numbering system and one class viz. 60 as per ANSI (American National Standards Institute) standards numbering system for abrasive sheets.

Categories:
301 Views

The dataset encompasses a diverse array of electrical signals representing Power Quality Disturbances (PQD), both in single and combined forms, meticulously generated in adherence to the IEEE 1159 guideline.  Crucially, the dataset includes both raw data and corresponding labels, facilitating supervised learning tasks and enabling the development and evaluation of classification algorithms.

Categories:
1162 Views

Our DeepCoAST dataset specifically explores the vulnerabilities of various traffic-splitting Website Fingerprinting (WF) Defenses, such as TrafficSliver, HyWF, and CoMPS. Our dataset comprises defended traces generated from the BigEnough dataset, which includes Tor cell trace instances of 95 websites, each represented by 200 instances collected under the standard browser security level. We simulated the traffic-splitting defenses assuming there are two split traces from the vanilla trace.

Categories:
48 Views

Pages