Computational Intelligence

This Dataset is related to the data prices of the cryptocurrency "Ethereum" over four years, from 01/01/2018 to 11/22/2022. Also, the new dataset created by the predictions of the intelligent filtered LSTM model is included.

Categories:
614 Views

PROTEIN STRUCTURE AND SYNTHETIC MULTI-VIEW CLUSTERING DATASETS

Multi-View Clustering (MVC) datasets used in the following paper:

Evolutionary Multi-objective Clustering Over Multiple Conflicting Data Views. Authors: Mario Garza-Fabre, Julia Handl, and Adán José-García. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION. Accepted for publication, November 2022.

This entry contains all 420 datasets used in the paper, including:

Categories:
258 Views

A real-world radio frequency (RF) fingerprinting dataset for commercial off-the-shelf (COTS) Bluetooth and WiFi emitters under challenging testbed setups is presented in this dataset. The chipsets within the devices (2 laptops and 8 commercial chips) are WiFi-Bluetooth combo transceivers. The emissions are captured with a National Instruments Ettus USRP X300 radio outfitted with a UBX160 daughterboard and a VERT2450 antenna. The receiver is tuned to record a 66.67 MHz bandwidth of the spectrum centered at the 2.414 GHz frequency.

Categories:
2656 Views

The data collection includes posts from social media networks popular among Russian-speaking people. The information was gathered using pre-defined keywords ("war," "special military operation," and so on) and is mainly relevant to Ukraine's continuing conflict with Russia. Following a thorough assessment and analysis of the data, propaganda and false news were detected. The information gathered has been anonymized. Feature engineering and text preparation can extract new insights and information from this data source.

Categories:
2405 Views

To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has entire network data at the time of several cyber attacks to enable experimentation on challenges based on implementing defense mechanisms on a larger scale. For collecting the data, we captured the network traffic of configured virtual machines using Wireshark and tcpdump.

Categories:
2349 Views

Due to the smaller size, low cost, and easy operational features, small unmanned aerial vehicles (SUAVs) have become more popular for various defense as well as civil applications. They can also give threat to national security if intentionally operated by any hostile actor(s). Since all the SUAV targets have a high degree of resemblances in their micro-Doppler (m-D) space, their accurate detection/classification can be highly guaranteed by the appropriate deep convolutional neural network (DCNN) architecture.

Categories:
5543 Views

In the view of national security, radar micro-Doppler (m-D) signatures-based recognition of suspicious human activities becomes significant. In connection to this, early detection and warning of terrorist activities at the country borders, protected/secured/guarded places and civilian violent protests is mandatory.

Categories:
5674 Views

The dataset includes active power measurements for a residential dwelling (apartment) located in Bucharest, Romania, collected at 1s second reporting rate over several months.
Always-on appliances include the refrigerator and the wireless router. Several other appliances are installed in the residential unit: washing machine, lighting fixtures, electrical iron, vacuum cleaner, various ICT charging devices, and air conditioning (seldom used).

Categories:
1349 Views

China has a vast territory, and different regions have different air quality conditions. The database selects the air quality of 264 major cities in China as the research object.

Categories:
797 Views

 

It contains all the log information of customers in the shopping mall.

Categories:
453 Views

Pages