Artificial Intelligence
Social images analysis from social networks is considered as one of the most popular social technologies. Social images analysis is an active research topic in recent years and in order to promotes social images’s analysis research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the SmartCityZen database’2016 freely of charge to social images analysis researchers.
- Categories:
Social images analysis from social networks is considered as one of the most popular social technologies. Social images analysis is an active research topic in recent years and in order to promotes social images’s analysis research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the Sm@rtCityZen social images database freely of charge to social images analysis researchers.
- Categories:
Biometric-based hand modality is considered as one of the most popular biometric technologies especially in forensic applications. Hand recognition is an active research topic in recent years and in order to promote hand’s recognition research, the REGIM-Lab.: REsearch Groups in Intelligent Machines, ENIS, University of Sfax, Tunisia provides the REgim Sfax Tunisian hand database (REST database) freely of charge to mainly hand and palmprint recognition researchers.
- Categories:
Here are some of the software vulnerability real-world data sets.
The original real-world data sets, collected by Lin et al. (https://github.com/DanielLin1986/TransferRepresentationLearning), which contain the source codes of vulnerable and non-vulnerable functions obtained from six real-world software projects, namely FFmpeg, LibTIFF, LibPNG, VLC and Pidgin. These datasets cover both multimedia and image application categories.
- Categories:
Anxiety affects human capabilities and behavior as much as it affects productivity and quality of life. It can be considered as the main cause of depression and suicide. Anxious states are easily detectable by humans due to their acquired cognition, humans interpret the interlocutor’s tone of speech, gesture, facial expressions and recognize their mental state. There is a need for non-invasive reliable techniques that perform the complex task of anxiety detection.
- Categories:
Character recognition has been widely understood as a means of mechanizing the process of understanding text in the written form to facilitate fast and efficient use of text. Indeed, text existing all around us presents information for peoples. However, tourists in foreign countries are unable to understand what indicate text on road signs, shop names, product advertisements, posters, etc. when they are unfamiliar with the native language of the visited country.
- Categories:
The ADAB database (The Arabic handwriting Data Base) was developed to advance the research and development of Arabic on-line handwritten systems. This database is developed in cooperation between the Institut fuer Nachrichtentechnik (IfN) and Research Groups in Intelligent Machines, University of Sfax, Tunisia. The text written is from 937 Tunisian town/village names. A pre-label assigned to each file consists of the postcode in a sequence of Numeric Character References, which stored in the UPX file format.
- Categories:
Our dataset, which is Nepali news dataset, contains 17 categories, including Art, Bank, Blog, Business, Diaspora, Entertainment, Filmy, Health, Hollywood-bollywood, Koseli, Literature, Music, National, Opinion, Society, Sports, and World.
If you use this dataset, please cite our paper.
Sitaula C, Basnet A, Aryal S. 2021. Vector representation based on a supervised codebook for Nepali documents classification. PeerJ Computer Science 7:e412 https://doi.org/10.7717/peerj-cs.412
- Categories:
The dataset consists all the Telugu characters that contains Vowels, Consonants and combine characters such as Othulu (Consonant-Consonant) and Guninthamulu (Consonant-Volwels). The main objective of this dataset to recognize handwritten Telugu characters, from that convert handwritten document into editable electronic copy.
- Categories:
Training, Test, and Validation data pertaining to the real-time packet data captured in Sonic Firewall is attached herewith.
- Categories: