Computational Intelligence

The data collection includes posts from social media networks popular among Russian-speaking people. The information was gathered using pre-defined keywords ("war," "special military operation," and so on) and is mainly relevant to Ukraine's continuing conflict with Russia. Following a thorough assessment and analysis of the data, propaganda and false news were detected. The information gathered has been anonymized. Feature engineering and text preparation can extract new insights and information from this data source.

Categories:
715 Views

To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has entire network data at the time of several cyber attacks to enable experimentation on challenges based on implementing defense mechanisms on a larger scale. For collecting the data, we captured the network traffic of configured virtual machines using Wireshark and tcpdump.

Categories:
727 Views

Due to the smaller size, low cost, and easy operational features, small unmanned aerial vehicles (SUAVs) have become more popular for various defense as well as civil applications. They can also give threat to national security if intentionally operated by any hostile actor(s). Since all the SUAV targets have a high degree of resemblances in their micro-Doppler (m-D) space, their accurate detection/classification can be highly guaranteed by the appropriate deep convolutional neural network (DCNN) architecture.

Categories:
672 Views

In the view of national security, radar micro-Doppler (m-D) signatures-based recognition of suspicious human activities becomes significant. In connection to this, early detection and warning of terrorist activities at the country borders, protected/secured/guarded places and civilian violent protests is mandatory.

Categories:
1188 Views

The dataset includes active power measurements for a residential dwelling (apartment) located in Bucharest, Romania, collected at 1s second reporting rate over several months.
Always-on appliances include the refrigerator and the wireless router. Several other appliances are installed in the residential unit: washing machine, lighting fixtures, electrical iron, vacuum cleaner, various ICT charging devices, and air conditioning (seldom used).

Categories:
348 Views

China has a vast territory, and different regions have different air quality conditions. The database selects the air quality of 264 major cities in China as the research object.

Categories:
190 Views

 

It contains all the log information of customers in the shopping mall.

Categories:
147 Views

Industrial drying processes are an energy extensive and often one of the most time consuming processes in a manufacturing line. Optimizing the drying process can therefore lead to a reducing in energy consumption and an increase in manufacturing throughput.

Categories:
237 Views

<p>Numerical comparison serves as a major tool in evaluating the performance of optimization algorithms, especially nondeterministic algorithms, but existing methods may suffer from a ‘cycle ranking’ paradox and/or a ‘survival of the nonfittest paradox. This paper searches for paradox-free data analysis methods for numerical comparison. It is discovered that a class of sufficient conditions exist for designing paradox-free analysis. Rigorous modeling and deduction are applied to a class of profile methods employing a filter.

Categories:
64 Views

Please cite the following paper when using this dataset:

N. Thakur and C.Y. Han, “An Exploratory Study of Tweets about the SARS-CoV-2 Omicron Variant: Insights from Sentiment Analysis, Language Interpretation, Source Tracking, Type Classification, and Embedded URL Detection,” Journal of COVID, 2022, Volume 5, Issue 3, pp. 1026-1049

Abstract

Categories:
811 Views

Pages