Artificial Intelligence

Two electric vehicles were used in this study, namely the Renault Zoe Q210 2016 and the Renault Kangoo ZE 2018. The EVs were equipped with data loggers connected to the CAN bus recording data on the HV battery current, voltage, SoC, and instantaneous speeds. We also used a GPS logger mobile application to record GPS tracks and altitudes. Data were collected from six drivers (four men and two women) with varying levels of driving experience (from less than two months to more than 10 years) on a variety of roads and driving conditions for nearly 200 kilometers

Categories:
3908 Views

We conducted the experiments on seven different size instances for training and testing.

We used the notation |J| X |M| to denote that a DFJSP instance consists of |J| jobs and |M| machines.

Specifically, 10X10, 20X20, 30X30 are three static instances and four dynamic instances of various scales considering continuous arrival of jobs are set as 20X10, 30X15, 50X20, 100X20.

Categories:
113 Views

Autonomous detection of occluded humans in sparsely populated area

Categories:
68 Views

The data comes from the Qingdao Public Security Traffic Information Service Network, which provides the city's traffic index and is a comprehensive system. The traffic operation index is a comprehensive index for the theoretic evaluation of the overall operation of the road network. Compared with the traditional parameters such as vehicle speed and flow, it has the characteristics of being intuitive and simple.

Categories:
81 Views

This dataset contains  job and their skills extracted from the job adverisments. 

Categories:
2300 Views

This project investigates bias in automatic facial recognition (FR). Specifically, subjects are grouped into predefined subgroups based on gender, ethnicity, and age. We propose a novel image collection called Balanced Faces in the Wild (BFW), which is balanced across eight subgroups (i.e., 800 face images of 100 subjects, each with 25 face samples).

Categories:
1633 Views

The goal of our research is to identify malicious advertisement URLs and to apply adversarial attack on ensembles. We extract lexical and web-scrapped features from using python code. And then 4 machine learning algorithms are applied for the classification process and then used the K-Means clustering for the visual understanding. We check the vulnerability of the models by the adversarial examples. We applied Zeroth Order Optimization adversarial attack on the models and compute the attack accuracy.

Categories:
2181 Views

This dataset contains 1050 multi-pattern multi-bin wafer bin maps (WBMs) synthesized from WM-811K binary WBM dataset and real world multi-bin WBMs using a trained pix2pix model.

Categories:
661 Views

The Baseline set described in the IEEE article (https://ieeexplore.ieee.org/document/10077565)   as Baseline_set  contains 1442450 rows, where the number of rows varied between 15395 and 197542 for the 16 subjects;  the average per subject being 69095 rows. The data set is filtered and standardized as described in III.C in the submission . The other data sets used in the article are derived from Baseline set.

Categories:
1005 Views

One to three columns of data are X, Y, Z coordinates respectively

Categories:
482 Views

Pages