Artificial Intelligence
The project research team successfully established China's first Inertial Motion Tracking Dataset (IMTD), which can be widely used for artificial intelligence model training in fields such as satellite-free navigation, unmanned driving, and wearable devices. Based on the IMTD dataset, the motion tracking method proposed by Wang Yifeng, Zhao Yi, and others breaks through the limitations of traditional motion tracking and positioning technologies such as inertia, optics, GPS, and carrier phase.
- Categories:
Sign language correctness discrimination (SLCD) dataset is collected for sign language teaching. Different from general sign language recognition datasets, SLCD dataset has two kind labels of sign language category and standardization category at the same time. The standardization category is to describe action correctness of the same sign language made by students. The SLCD dataset videos in this paper are obtained by camera. 76 students are recruited to collect sign language actions.
- Categories:
This paper investigated how to increase the number of connections among users in hierarchical non-terrestrial networks (HNTNs) assisted disaster relief service (DRS). We aim to maximize the number of satisfactory connections (NSCs) by optimizing the unmanned aerial vehicles (UAV) radio resources, computing resources, and trajectory at each time slot. In particular, the UAVs are exploited as aerial base stations (ABSs) to provide a link for the reduced capability (RedCap) user equipment (UE) based on power domain non-orthogonal multiple access (PD-NOMA).
- Categories:
This data collection focuses on capturing user-generated content from the popular social network Reddit during the year 2023. This dataset comprises 29 user-friendly CSV files collected from Reddit, containing textual data associated with various emotions and related concepts.
- Categories:
ABSTRACT As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard including signature-based and machine-learning (ML) based systems. More recently, researchers are considering deep learning (DL) based anomaly detection approaches. Most proposed works in this research field aimed to achieve either one or a combination of high accuracy, considerably low false alarm rates (FARs), high classification specificity and detection sensitivity, achieving lightweight DL models, or other ML and DL-related performance measurement metrics. In this study, we propose a novel method to convert a raw dataset to an image dataset to magnify patterns. Based on this we devise an anomaly detection for IDS using a lightweight convolutional neural network (CNN) that classifies denial of service and distributed denial of service. The proposed methods were evaluated using a modern dataset, CSE-CIC-IDS2018, and a legacy dataset, NSL-KDD. We have also applied a combined dataset to assess the generalization of the proposed model across various datasets. Our experimental results have demonstrated that the proposed methods achieved high accuracy and considerably low FARs with high specificity and sensitivity. The resulting loss and accuracy curves have also demonstrated the excellent generalization of the proposed lightweight CNN model, effectively avoiding overfitting. This holds for both the modern and legacy datasets, including their mixed version.
- Categories:
FormAI is a novel AI-generated dataset comprising 112,000 compilable and independent C programs. All the programs in the dataset were generated by GPT-3.5-turbo using dynamic zero-shot prompting technique and comprises programs with varying levels of complexity. Some programs handle complicated tasks such as network management, table games, or encryption, while others deal with simpler tasks like string manipulation. Each program is labelled based on vulnerabilities present in the code using a formal verification method based on the Efficient SMT-based Bounded Model Checker (ESBMC).
- Categories:
Most of the current smoke detection techniques are developed using CCTV images. To identify the wildfire early, it can be useful to deploy satellite imagery and develop models that can recognize smoke in forest areas. However, very few labelled satellite image datasets are available to build the wildfire smoke detection model. In order to find a solution to this problem, a dataset consisting 23, 644 satellite images was gathered. The dataset is divided into four categories: smoke, smoke with fog, non-smoke, and non-smoke with fog.
- Categories:
We introduce a high-performance computer vision based Intraveneous (IV) infusion speed measurement system as a camera application on an iPhone or Android phone. Our system uses You Only Look Once version 5 (YOLOv5) as it was designed for real-time object detection, making it substantially faster than two-stage algorithms such as R-CNN. In addition, YOLOv5 offers greater precision than its predecessors, making it more competitive with other object detection methods.
- Categories:
Problems related to ventral hernia are very common, and evaluating them using computational methods can assist in selecting the most appropriate treatment. This study collected data from over 3500 patients from different European countries observed during last 11 years (2012-2022), which were collected by specialists in hernia surgery. The majority of patients underwent standard surgical procedures, with a growing trend towards robotic surgery. This paper focuses on statistically evaluating the treatment methods in relation to patient age, body mass index (BMI), and the type of repair.
- Categories: