Artificial Intelligence
A Dataset Bundle for Building Automation and Control Systems
useful for Security Analysis and to study the normal operation of these systems
This document describes a dataset bundle with diverse types of attacks, and also a not poisoned dataset. The capture was obtained in a real house with a complete Building Automation and Control System (BACS). This document describes the several included datasets and how their data can be employed in security analysis of KNX based building Automation.
- Categories:
Cheap MEMS sensors BMX055 were used to obtain the IMU data measurement. Three locations - thigh, shin, and foot were chosen strategically to capture good information about bipedal movement on a single leg. This is in contrast to previous studies, which often use highly accurate and thus expensive sensors. For each location, one BMX055 was used to capture 6DOF information of orthogonal accelerometer and gyroscope.
- Categories:
Brainwave entrainment beats detection has become an important topic due to the ability of these beats to change human brain waves to decrease anxiety, help focus attention, improve memory, improve mood, enhance creativity, reduce pain, help with meditation, enhance mental flexibility, and enhance sleep quality. However, listening to it can cause unwanted side effects as it can increase feelings of depression, anxiety, anger, and confusion in some people.
- Categories:
The MCNews dataset was obtained for this paper in May 2021 from major Internet news (Sina, Netease, Thepaper.cn, etc.) and official media (Xinhua, People’s Daily, China News, etc.) via the Internet.
- Categories:
In this project, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including, Cloud Computing Layer, Network Functions Virtualization Layer, Blockchain Network Layer, Fog Computing Layer, Software-Defined Networking Layer, Edge Computing Layer, and IoT and IIoT Perception Layer.
- Categories:
The fast development of urban advancement in the past decade requires reasonable and realistic solutions for transport, building infrastructure, natural conditions, and personal satisfaction in smart cities. This paper presents and explores predictive energy consumption models based on data-mining techniques for a smart small-scale steel industry in South Korea. Energy consumption data is collected using IoT based systems and used for prediction.
- Categories:
We present a passive stereo depth system that produces dense and accurate point clouds optimized for human environments, including dark, textureless, thin, reflective and specular surfaces and objects, at 2560x2048 resolution, with 384 disparities, in 30 ms. The system consists of an algorithm combining learned stereo matching with engineered filtering, a training and data-mixing methodology, and a sensor hardware design. Our architecture is 15x faster than approaches that perform similarly on the Middlebury and Flying Things Stereo Benchmarks.
- Categories:
This dataset consists of 2 types of images i.e Authentic and Tampered. There are a total of 1,389 Authentic images and 597 Tampered images. Authentic images are camera clicked images in raw form & tampered images are the one being edited by Adobe Photoshop and few mobile applications. Different types of forgery techniques like copy-move, splicing, color enhancement, resizing etc have been applied on the tampered images.
- Categories:
This is a dataset regarding the creation of forgery images. The dataset consists of 1000 original and 3000 forgery images generated from the original images. The original images have been retrieved from publicly available repositories. Three different models have been used for creating the forgery images: cut-paste, copy-move, and erase-filling. Both pre-processing (sharpening, color enhancement, resizing, blurring, regulating exposure) and post-processing (sampling, rotation, masking) techniques have been considered for the generation of the forgery images.
- Categories: