Machine Learning
Context
This dataset consists of subject wise daily living activity data, which is acquired from the inbuilt accelerometer and gyroscope sensors of the smartphones.
Content
The smartphone was mounted on the waist and front pockets of the users. All the different activities were performed in a laboratory except Running, which was performed on a Football Playground.
Smartphone used: Poco X2 and Samsung Galaxy A32s
Inbuild Sensors used: Accelerometer and Gyroscope
Ages: All subjects are Above 23 years
- Categories:
Packet delivery ratio data collected for the article Wireless-Sensor Network Topology Optimization in Complex Terrain: A Bayesian Approach. Published in the IEEE Internet of Things Journal.
- Categories:
The data set contains inspections conducted by the Norwegian Labour Inspection Authority (NLIA) between 2012 and 2019. Each row in the dataset contains a control point, non-compliance indicator for the control point and industry code / municipality / county of the inspected organisation.
- Categories:
The "RetroRevMatchEvalICIP16" dataset provides a retrospective reviewer recommendation dataset and evaluation for IEEE ICIP 2016. The methodology via which the recommendations were obtained and the evaluation was performed is described in the associated paper.
Y. Zhao, A. Anand, and G. Sharma, “Reviewer recommendations using document vector embeddings and a publisher database: Implementation and evaluation,” IEEE Access, vol. 10, pp. 21 798–21 811, 2022. https://doi.org/10.1109/ACCESS.2022.3151640
- Categories:
This is a dataset is an example of a distribution of 20 correlated Bernoulli random variables.
- Categories:
Microwave-based breast cancer detection is a growing field that has been investigated as a potential novel method for breast cancer detection. Breast microwave sensing (BMS) systems use low-powered, non-ionizing microwave signals to interrogate the breast tissues. While some BMS systems have been evaluated in clinical trials, many challenges remain before these systems can be used as a viable clinical option, and breast phantoms (breast models) allow for rigorous and controlled experimental investigations.
- Categories:
This dataset is a hand noted dataset that consists of two categories, evasion and normal methods. By evasion methods we mean the methods that are used by Android malware to hide their malicious payload, and hinder the dynamic analysis. Normal methods are any other methods that cannot be used as evasion techniques. Also, the evasion methods are categorized into six categories: File access, Integrity check, Location, SMS, Time, Anti-emulation. This dataset can be used by any ML or DL approaches to predict new evasion techniques that can be used by malware to hinder the dynamic analysis.
- Categories:
In this paper, the security-aware robust resource allocation in energy harvesting cognitive radio networks is considered with cooperation between two transmitters while there are uncertainties in channel gains and battery energy value. To be specific, the primary access point harvests energy from the green resource and uses time switching protocol to send the energy and data towards the secondary access point (SAP).
- Categories:
1.Visualization of convolutional neural network layers for one participant at ROI 301 * 301
2.Convolutional neural network structure analysis in Matlab
3.Convolutional neural network Matlab code
4.Videos of brightness mode (B-mode) ultrasound images from two participants during the recorded walking trials at 5 different speeds
- Categories: