*.csv

The B2F dataset (Biometric images of Fingerprints and Faces) has been prepared for face and fingerprint recognition, verification or classification.

The first subset (Fingerprint): This set of data presents the five finger feature vectors (of the left hand) for each person in a csv files.

The second subset (Face): This set of data presents feature vectors of face images in csv files. Feature vectors were extracted using the model (ResNet-50 + ArcFace). This set of face feature vectors represents:

Categories:
1602 Views

To utilize a quantum annealing system such as D-Wave's to solve a graph coloring problem,
it is necessary to convert the utility polynomial into a quadratic polynomial in binary variables.
This is called QUBO (quadratic unconstrained binary optimization) problem.
In any degree reduction process, we need to introduce auxiliary variables,
and more variables we have in the QUBO problem, less likely a
quantum annealing system can find an optimal solution.
The current degree reduction methods applies to monomials.

Categories:
4 Views

This Data set was obtained from a Hospital in Karaikudi, Tamilnadu Iindia, and has 400 insstances with 25 attributes, intended for classification problems. 
The Data Set has medical relevant variables that can be associated to the presence of CKD (Chronical Kidney Diasease). Some of the variables can be arguably more relevant for the model, and after analysis some of them can be correlated, so it's recommended to analyze the dataset and decide the best approach based on individual needs. 

Categories:
4862 Views

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
4052 Views

Unmanned aerial vehicles (UAVs) are being used for various applications, but the associated cyber risks are also increasing. Machine learning techniques have been successfully adopted to develop intrusion detection systems (IDSs). However, none of the existing works published the cyber or physical datasets that have been used to develop the IDS, which hinders further research in this field.

Categories:
3140 Views

The dataset contains a collection of V2X (Vehicle-to-Everything) messages for classification, prioritization, and spam message detection. It comprises 1,000 messages with varying message types, content, priorities, and spam labels. The messages are sourced from different vehicles with specific destination vehicles or broadcast to all vehicles. They cover various message types, including traffic updates, emergency alerts, weather notifications, hazard warnings, roadwork information, and spam messages. The priority of the messages is categorized as either high, medium, or low.

Categories:
1248 Views
This dataset contain the pulse responses of the Sallen-Key bandpass filter circuit and the amplifier board circuit. The test excitation is a 10 us pulse signal with an amplitude of 5 V and a frequency of 5 kHZ that exhibits abundant frequency components. By observing the pulse response, the sampling frequency is set to 5 MHz and the number of sampling points for each sample is fixed at 1000 in Case 1. PSPICE is applied for circuit simulation to set up the circuit fault according to the range of fault component parameter values.
Categories:
275 Views

Dataset for Identification of Saturated and Unsaturated WiFi Networks

The Dataset comprises the histogram of Inter-frame spacing for saturated and unsaturated WiFi networks.

In order to develop a CNN model that can classify saturated and unsaturated traffic in WiFi network, we prepared a large dataset that represents the traffic characteristics of both cases. 

Categories:
259 Views

Dataset for Identification of Saturated and Unsaturated WiFi Networks

The Dataset comprises the histogram of Inter-frame spacing for saturated and unsaturated WiFi networks.

In order to develop a CNN model that can classify saturated and unsaturated traffic in WiFi network, we prepared a large dataset that represents the traffic characteristics of both cases. 

Categories:
343 Views

Over speeding of vehicles is considered as one of the most important factors for occurring road accidents. An advanced sensor technology motivates the researchers to move towards automatic vehicles, whereas the speed decisions were taken based on the information collected from the sensor. Beyond its success, the expensiveness, and implementation failure in bad road conditions make it less practicable. In this work, a novel FeduLPM technique has been proposed for controlling the speed in customizable automotive variants using data analysis from the location of the accident.

Categories:
38 Views

Pages