Artificial Intelligence

Industrial Internet of Things (IIoTs) are high-value cyber targets due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions.

Categories:
4854 Views

Brain-Computer Interface (BCI) has become an established technology to interconnect a human brain and an external device. One of the most popular protocols for BCI is based on the extraction of the so-called P300 wave from EEG recordings. P300 wave is an event-related potential with a latency of 300 ms after the onset of a rare stimulus. In this paper, we used deep learning architectures, namely convolutional neural networks (CNNs), to improve P300-based BCIs.

Categories:
884 Views

 This dataset is in support of my Research paper 'Detection of Pancreatic,Ovarian & Prostate Tumor, Cancer and Treatment by Ablation'.Due to computer crash, all work, datasets and old papers lost. Re-work may be submitted.

For Machine design, pls refer, open-access page 'Data and Designs of B-Machines'

Categories:
997 Views

This document describes the details of the BON Egocentric vision dataset. BON denotes the initials of the locations where the dataset was collected; Barcelona (Spain); Oxford (UK); and Nairobi (Kenya). BON comprises first-person video, recorded when subjects were conducting common office activities. The preceding version of this dataset, FPV-O dataset has fewersubjects for only a single location (Barcelona). To develop a location agnostic framework, data from multiple locations and/or office settings is essential.

Categories:
874 Views

Due to the multi-path propagation and extreme sensitivity to minor changes in the propagation medium, the coda waves open new fascinating possibilities in non-destructive evaluation and acoustic imaging. However, their noise-like structure and high spurious sensitivity for ambient conditions (temperature, humidity, and others) make it challenging to perform localized inspection in the overall coda wave evolution.

Categories:
317 Views

Water consumption. Data recorded between 2017.1.1 and 2019.12.31.

Categories:
518 Views

With the motivation of no good data sources available for all diseases (from generic to chronic) and their treatment courses, a new dataset is synthesized by exploring several medical websites and resources. It provides the precaution list corresponding to over 1000+ diaganosis. prec\_t.csv : (did, diagnose, pid) = (Disease identifier, Disease name, treatment course). This dataset can be utilized for many machine learning or deep learning based healthcare applications.

Categories:
6340 Views

Depressive/Non-depressive tweets  between December 2019 and December 2020 originated largely from India and parts of Indian subcontinent. Sentiment Scores alloted using text blob. Tweets are extracted specifically keeping in mind the top 250 most frequently used negative lexicons and positive lexicons accesed using SentiWord and various research publications.

Tweet Amount : 1.4 Lakhs

 

Categories:
993 Views

Dataset used in the article "An Ensemble Method for Keystroke Dynamics Authentication in Free-Text Using Word Boundaries". For each user and free-text sample of the companion dataset LSIA, contains a CSV file with the list of words in the sample that survived the filters described in the article, together with the CSV files with training instances for each word. The source data comes from a dataset used in previous studies by the authors. The language of the free-text samples is Spanish.

Categories:
487 Views

Dataset asscociated with a paper in 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems

"Talk the talk and walk the walk: Dialogue-driven navigation in unknown indoor environments"

If you use this code or data, please cite the above paper.

 

Categories:
238 Views

Pages