Artificial Intelligence

1.    The release data includes the original data of wind turbine X30 at 2018 and 2019, which are files “2019_x30.csv” and “2018_x30.csv” in directory “Original data”.    For the turbine, the wind speed and direction are collected at each 30 seconds, then there are 2880 data at a day. In the experiment, we use the slide window with 120 data, which corresponding to an hours, and slide the window with 10 data step, which corresponding to 5 minutes. For the data in window, we select the data of final 10 minutes as the label.

Categories:
360 Views

Complex networks exhibit inherent community structures that contain rich topology information of graphs. Existing graph neural networks (GNNs) have not fully utilized community structures and integrating them into GNNs has the potential to enhance nodes' representation capabilities and prediction performance. In this paper, we propose a community-aware graph neural network (CAG), which designs a community subgraph explorer (CSE) that leverages monte carlo tree search (MCTS) to select the most informative subgraphs within communities.

Categories:
27 Views

The dataset encompasses an extensive collection of patient information, delving into their comprehensive medical background, encompassing a myriad of features that encapsulate not only the physical but also the mental and emotional states. Furthermore, the dataset is enriched with invaluable ECG data derived from the patients. Moreover, our dataset boasts additional features meticulously extracted from the ECG records, thereby enhancing the potential for our machine learning model to undergo more effective training with our rich and diverse data.

Categories:
589 Views

We define personal risk detection as the timely identification of when someone is in the midst of a dangerous situation, for example, a health crisis or a car accident, events that may jeopardize a person’s physical integrity. We work under the hypothesis that a risk-prone situation produces sudden and significant deviations in standard physiological and behavioural user patterns. These changes can be captured by a group of sensors, such as the accelerometer, gyroscope, and heart rate.

Categories:
771 Views

UTERUS: The uterus dataset (Huang et al. 2021) collected from the treatment device HIFU Pro2008 of Shenzhen ProHuiren Company. The dataset comprises 495 HIFU treatment ultrasound monitoring images of uterus, with 330 images randomly selected for training, 50 images for validating and 115 images for testing. The target region for treatment is the tumor region in the ultrasound image, as marked by professional doctors, and the image size is 448×544 pixels.

Categories:
777 Views

To evaluate the proposed odometry method based on 360-degree cameras, we build a new dataset using an Insta-360 One X2 device, which provided high-resolution 4K images captured at a rate of 30 frames per second and 500\,Hz IMU measurements from its built-in IMU.Different from previous datasets, we have set the illumination brightness and the camera movements as the condition variable. The sequence can be classified based on changes in illumination speed or camera movement intensity.

Categories:
575 Views

Activities of daily living (ADLs) monitoring is essenitial in elderly field as it provides daily activities information for caregivers. In human daily life, different activities occur in various locations and generate distinct sounds and body movement. We can combine this kind of information to recognize the activities.

Categories:
261 Views

The Internet Graphs (IGraphs) dataset is a substantial collection of real intra-AS (Autonomous System) graphs sourced from the Internet Topology Data Kit (ITDK) project. Comprising a total of 90,326 graphs, each ranging from 12 to 250 nodes, this dataset provides a diverse and extensive resource for the exploration and analysis of network structures within autonomous systems.

Categories:
842 Views

We looked at 10,269 users on Twitter and collected their tweets and the follower network from April 2019 to October 2019. We organized tweets with the same hashtag into 29,192 cascades. To find an active community, we first selected 500 popular seed users. Subsequently, we added users who followed these seed users to the target group. After adding more users iteratively for five rounds, we locked the target group.

Categories:
235 Views

This dataset has been specially curated to demonstrate various image anonymization techniques for protecting privacy-sensitive areas. Gaussian blurring is used to selectively blur parts of the image, creating a blend of the original and blurred visuals. The pixelation process reduces the image to small pixel blocks and then resizes them back to their original dimensions, creating a pixelated appearance in designated areas. Distortion is implemented through elastic deformation, adding displacement fields generated by combining a Gaussian filter with a uniform random field to the image.

Categories:
175 Views

Pages