Dataset for segmentation of the defects on the surfaces of the military cartridge cases. The datasets with non-defective, defective and masked image classes of the defective cartridge cases.

Categories:
92 Views

The picture shows the operation result of image security retrieval.  The experiment was validated on five common data sets.

Categories:
48 Views

"128_dim_word_vector" is the word vector that is used in 2.2.1.  "86 keywords"  is used to extract directive sentences in section 3.1.1. "constructed_KG and source_of_data" contains the constructed API-Task KG and source of data used in constructed KG. ”Experiment RQ_1 and RQ_2" is the experiment data. "Empirical_study" contains the Stack Overflow questions that are used in the empirical study.

 

Categories:
76 Views

Anonymous network traffic is more pervasive than ever due to the accessibility of services such as virtual private networks (VPN) and The Onion Router (Tor). To address the need to identify and classify this traffic, machine and deep learning solutions have become the standard. However, high-performing classifiers often scale poorly when applied to real-world traffic classification due to the heavily skewed nature of network traffic data.

Categories:
134 Views

Counting the appearance of characters in videos is still an unsolved problem in computer vision, and the related dataset is insufficient and un-extracted. This dataset provides some labeled data for some video clips with interested character face pictures and appearance time. In this way, it provides the training and testing datasets for artificial intelligence models to do statistics about the appearance of characters in videos.

Categories:
88 Views

Traffic data set

Categories:
47 Views

This dataset accurately models the internal behavior of an IoT spectrum sensor (belonging to the ElectroSense platform and consisting of a Raspberry Pi 3 with a software-defined radio kit) when it is functioning normally and under attack. To accomplish it, the system calls of the IoT sensor are monitored under normal behavior, gathered, cleaned, and stored in a centralized directory. Then, the device is infected with current malware affecting IoT devices, such as the Bashlite botnet, Thetick backdoor, Bdvl rootkit, and a Ransomware proof of concept.

Categories:
157 Views

In this paper, we propose a novel cooperative resource sharing in a multi-tier edge slicing networks which is

robust to imperfect channel state information (CSI) caused by user equipments’ (UEs) mobility. Due to the mobility

of UEs, the dynamic requirements of their tasks, and the limited resources of the network, we propose a smart joint

dynamic pricing and resources sharing (SJDPRS) scenario that can incentivize the infrastructure provider (InP) and

mobile network operators (MNOs). Aiming to maximize the profits of UEs, MNOs and the InP under the task

Categories:
103 Views

This document has description of acoustic and vibration data of defect cases of centrifugal pump,  Test rig facility, sensor, and data acquisition device located at Precision Metrology Laboratory, Mechanical Engineering Department of Sant Longowal Institute of Engineering and Technology Longowal, India.  

Categories:
1088 Views

This is the market data of Bitcoin in terms of price and volume from August 2015 to August 2021. The time interval of sampling is selected as four-hour, that is to say, we choose every kind of price and volume every of four-hour as the original data. The original market data of Bitcoin are obtained from Poloniex, one of the most active crypto-asset exchanges.
Download link on XBlock: http://xblock.pro/#/dataset/5

Categories:
170 Views

Pages