数据集收集于 2009 年至 2010 年,通常用于预测学生的表现和个性化。在学生信息方面,此数据集包含 525,535 行学生答案,包括 4,217 名学生和 124 种技能。

Categories:
38 Views

(Work in progress)

This dataset contains the augmented images and the images & segmentation maps for seven handwashing steps, six of which are prescirbed WHO handwashing steps.

This work is based on a sample handwashing video dataset uploaded by Kaggle user real-timeAR.

Categories:
154 Views

MCAD contains 5 seen classed and 68939 cell samples, and the unseen class contains 6 categories and 32679 cell samples. Seen class samples are collected from fecal microscopic images, while unseen class samples are collected from leucorrhea microscopic images. 

Categories:
73 Views

This is a subset of the ASHRAE Global Comfort Database that we used in our study to prove that Deep learning methods performs better than shallow methods predicting the thermal sensation.

Categories:
45 Views

This paper releases and describes the creation of the Massive Arabic Speech Corpus (MASC). This corpus is a dataset that contains 1,000 hours of speech sampled at 16~kHz and crawled from over 700 YouTube channels. MASC is multi-regional, multi-genre, and multi-dialect dataset that is intended to advance the research and development of Arabic speech technology with the special emphasis on Arabic speech recognition. In addition to MASC, a pre-trained 3-gram language model and a pre-trained automatic speech recognition model are also developed and made available for interested researches.

Instructions: 

Will be available soon

Categories:
311 Views

Owing to increased biosecurity and industrial demands, the poultry houses in Taiwan are generally nonopen and closed types, with automatic environmental control and sensor equipment gradually being installed in such houses. Environmental sensors and poultry health monitoring systems are necessary to improve poultry feeding efficiency and safety. In this work, we developed a goose surface temperature monitoring system based on deep learning using visible image and integrated with infrared thermal image.

Categories:
60 Views

The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules.

Categories:
1415 Views

This code and related data is related to research work on quantified benchmarking of Reconfigurable Intelligent Surface (RIS). Related research article has been submitted to VTM titled "Reconfigurable Intelligent Surfaces: Tradeoff between Unit-Cell- and Surface-Level Design under Quantifiable Benchmarks". 'ReadMe.text' file in 'RIS_restricted_02.zip' explains how to use the code to generate RIS configurations for RIS of arbitrary size and unit cell design, which can accomodate restricting to certain size grouped control.

Categories:
174 Views

Any work using this dataset should cite this paper as follows:

Nirmalya Thakur and Chia Y. Han, "Country-Specific Interests towards Fall Detection from 2004–2021: An Open Access Dataset and Research Questions", Journal of Data, Volume 6, Issue 8, pp. 1-21, 2021.

Abstract

Instructions: 

The instructions on how to use this dataset are available in the above-mentioned paper.

Categories:
457 Views

The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established.

Categories:
1393 Views

Pages