Artificial Intelligence

Data for neural networks.

Magnetic flux intensity - input

The real pose of a single magnet - output

Categories:
189 Views

Code example for Rethink, Revisit, Revise: A Spiral Reinforced Self-Revised Network for Zero-Shot Learning

Categories:
59 Views

Dataset for segmentation of the defects on the surfaces of the military cartridge cases. The datasets with non-defective, defective and masked image classes of the defective cartridge cases.

Categories:
363 Views

The picture shows the operation result of image security retrieval.  The experiment was validated on five common data sets.

Categories:
146 Views

"128_dim_word_vector" is the word vector that is used in 2.2.1.  "86 keywords"  is used to extract directive sentences in section 3.1.1. "constructed_KG and source_of_data" contains the constructed API-Task KG and source of data used in constructed KG. ”Experiment RQ_1 and RQ_2" is the experiment data. "Empirical_study" contains the Stack Overflow questions that are used in the empirical study.

 

Categories:
140 Views

This dataset represents the normal and faulty residual signals for the spacecraft reaction wheel. 

Categories:
83 Views

Anonymous network traffic is more pervasive than ever due to the accessibility of services such as virtual private networks (VPN) and The Onion Router (Tor). To address the need to identify and classify this traffic, machine and deep learning solutions have become the standard. However, high-performing classifiers often scale poorly when applied to real-world traffic classification due to the heavily skewed nature of network traffic data.

Categories:
776 Views

Measuring the appearance time slots of characters in videos is still an unsolved problem in computer vision, and the related dataset is insufficient and unextracted. The Character Face In Video (CFIV) dataset provides the labeled appearing time slots for characters of interest for ten video clips on Youtube, two faces per character for training, and a script for downloading each video. Additionally, three videos contain around 100 images per character for evaluating the accuracy of the face recognizer.

Categories:
332 Views

Traffic data set

Categories:
657 Views

This dataset accurately models the internal behavior of an IoT spectrum sensor (belonging to the ElectroSense platform and consisting of a Raspberry Pi 3 with a software-defined radio kit) when it is functioning normally and under attack. To accomplish it, the system calls of the IoT sensor are monitored under normal behavior, gathered, cleaned, and stored in a centralized directory. Then, the device is infected with current malware affecting IoT devices, such as the Bashlite botnet, Thetick backdoor, Bdvl rootkit, and a Ransomware proof of concept.

Categories:
1313 Views

Pages