Artificial Intelligence
The dataset presents user evaluations for itinerary recommendations generated with three algorithms, PP, PP+TS and PP+TP.
Users evaluated recommendations according to five properties:
- Categories:
Speech impairment constitutes a challenge to an individual's ability to communicate effectively through speech and hearing. To overcome this, affected individuals’ resort to alternative modes of communication, such as sign language. Despite the increasing prevalence of sign language, there still exists a hindrance for non-sign language speakers to effectively communicate with individuals who primarily use sign language for communication purposes. Sign languages are a class of languages that employ a specific set of hand gestures, movements, and postures to convey messages.
- Categories:
In deep learning, images are utilized due to their rich information content, spatial hierarchies, and translation invariance, rendering them ideal for tasks such as object recognition and classification. The classification of malware using images is an important field for deep learning, especially in cybersecurity. Within this context, the Classified Advanced Persistent Threat Dataset is a thorough collection that has been carefully selected to further this field's study and innovation.
- Categories:
Microsoft contains a productive tool known as MS Office but the inclusion of VBA Macros inside the MS Office for automation purposes makes it a way for attackers to perform malicious activities. To get an up-to-date dataset, the research regarding VBA macros is still working to find efficient ways to detect it. To perform analysis, the dataset is required which is publically harder to find. To overcome this issue, a dataset is created from VirusTotal, VirusShare, Zenodo, Malware Bazaar, Github and InQuest Labs.
- Categories:
The Sketchy images refer to hand-drawn drawings, while SCIST are those with unclear or weak semantic information, represent a distinctive cases from natural scenes.The primary objective of this dataset is to facilitate the style transfer, whether originating from manual sketches or digital renderings, into enriched and artistically embellished counterparts through the utilization of software.
- Categories:
- Categories:
This dataset acompanies our article titled "Insights into traditional Large Deformation Diffeomorphic Metric Mapping and unsupervised deep-learning for diffeomorphic registration and their evaluation", Computers in Biology and Medicine, 2024. This paper explores the connections between traditional Large Deformation Diffeomorphic Metric Mapping methods and unsupervised deep-learning approaches for non-rigid registration, particularly emphasizing diffeomorphic registration.
- Categories:
Dataset of images of dragon fruit plants, collected from different media and taken from a dragon fruit field in Rio Branco, Brazil, with a total of 600 images classified among 300 photos of sick plants, with fish eyes among others and 300 photos of healthy plants. For many of the photos, a simple smartphone
camera was used to capture the images.
- Categories:
Existing datasets of infrared and visible images only contain few extreme scenes, we construct a dataset of images with haze based on the M3FD dataset. We pick 450 aligned image pairs from M3FD dataset and synthesize hazy visible images using the ASM. Due to the unique imaging principle of infrared images, rarely affected by haze, there is no need to do additional process for infrared images. Finally, a dataset named MHS has been released, which contains 450 pairs of images in hazy conditions.
- Categories:
Current neural network solutions for channel estimation are frequently tested by training and testing on one example channel or similar channels. However, data-driven algorithms often degrade significantly on other channels which they are not trained on, because they cannot extrapolate their training knowledge. Online training can fine-tune the offline-trained neural networks to compensate for this degradation, but its feasibility is challenged by the tremendous computational resources required.
- Categories: