Artificial Intelligence

This dataset provides valuable insights into hand gestures and their associated measurements. Hand gestures play a significant role in human communication, and understanding their patterns and characteristics can be enabled various applications, such as gesture recognition systems, sign language interpretation, and human-computer interaction. This dataset was carefully collected by a specialist who captured snapshots of individuals making different hand gestures and measured specific distances between the fingers and the palm.

Categories:
612 Views

The FMK (Finger Major Knuckle) dataset was proposed and created to support the experiments of identity verificatio of knuckles of middle and thumb fingers modalites. The images of this dataset were captured using the rear camera of an OPPO A12 smartphone. This dataset was created from 20 different subjects between the ages of 30 and 67. For each subject there are 3 images of major knuckle for the middle finger and 3 images of major knuckle for thumb finger.. The FMK dataset was proposed and constructed for testing and evaluation.

Categories:
316 Views

Abstract—A novel approach is proposed in this article to boost the energy efficiency (EE) of an AoI-aware IoT network. In particular, we propose a new approach that is based a combination of simultaneous wireless information and power

Categories:
478 Views

A short time ago, the study of contactless fingerprint authentication gained appeal among biometric researchers. Contactless fingerprint systems offer various advantages, such as ease of capture and affordability, over conventional fingerprint identification systems, which demand that the user's finger make direct contact with the sensor.

Categories:
222 Views

The dataset is named Chinese rose disease dataset, including healthy leaves, black spot leaves, powdery mildew leaves and downy mildew leaves. All images in this dataset were collected from Nanyang City, Henan Province, China. And  all images were collected under natural conditions in order to ensure the true execution of the images. To improve the image variety, we randomly enhance the images in the dataset by flipped, changed the brightness, added Salt and pepper noise and added Gaussian noise.

Categories:
430 Views

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
1438 Views

The dataset contains a collection of V2X (Vehicle-to-Everything) messages for classification, prioritization, and spam message detection. It comprises 1,000 messages with varying message types, content, priorities, and spam labels. The messages are sourced from different vehicles with specific destination vehicles or broadcast to all vehicles. They cover various message types, including traffic updates, emergency alerts, weather notifications, hazard warnings, roadwork information, and spam messages. The priority of the messages is categorized as either high, medium, or low.

Categories:
527 Views
This dataset contain the pulse responses of the Sallen-Key bandpass filter circuit and the amplifier board circuit. The test excitation is a 10 us pulse signal with an amplitude of 5 V and a frequency of 5 kHZ that exhibits abundant frequency components. By observing the pulse response, the sampling frequency is set to 5 MHz and the number of sampling points for each sample is fixed at 1000 in Case 1. PSPICE is applied for circuit simulation to set up the circuit fault according to the range of fault component parameter values.
Categories:
149 Views

At present, various technologies have been developed for indoor positioning, such as Bluetooth, infrared, wireless local area network, radio frequency identification (RFID), and ultra-wide band (UWB) , but most of these technologies require hardware, are costly, and are susceptible to electromagnetic interference.

Categories:
105 Views

Translator   Translator   Translator   

Categories:
101 Views

Pages