Computational Intelligence

The data collection includes posts from social media networks popular among Russian-speaking people. The information was gathered using pre-defined keywords ("war," "special military operation," and so on) and is mainly relevant to Ukraine's continuing conflict with Russia. Following a thorough assessment and analysis of the data, propaganda and false news were detected. The information gathered has been anonymized. Feature engineering and text preparation can extract new insights and information from this data source.

Categories:
2471 Views

To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has entire network data at the time of several cyber attacks to enable experimentation on challenges based on implementing defense mechanisms on a larger scale. For collecting the data, we captured the network traffic of configured virtual machines using Wireshark and tcpdump.

Categories:
2515 Views

Due to the smaller size, low cost, and easy operational features, small unmanned aerial vehicles (SUAVs) have become more popular for various defense as well as civil applications. They can also give threat to national security if intentionally operated by any hostile actor(s). Since all the SUAV targets have a high degree of resemblances in their micro-Doppler (m-D) space, their accurate detection/classification can be highly guaranteed by the appropriate deep convolutional neural network (DCNN) architecture.

Categories:
6405 Views

In the view of national security, radar micro-Doppler (m-D) signatures-based recognition of suspicious human activities becomes significant. In connection to this, early detection and warning of terrorist activities at the country borders, protected/secured/guarded places and civilian violent protests is mandatory.

Categories:
6403 Views

The dataset includes active power measurements for a residential dwelling (apartment) located in Bucharest, Romania, collected at 1s second reporting rate over several months.
Always-on appliances include the refrigerator and the wireless router. Several other appliances are installed in the residential unit: washing machine, lighting fixtures, electrical iron, vacuum cleaner, various ICT charging devices, and air conditioning (seldom used).

Categories:
1423 Views

China has a vast territory, and different regions have different air quality conditions. The database selects the air quality of 264 major cities in China as the research object.

Categories:
876 Views

 

It contains all the log information of customers in the shopping mall.

Categories:
515 Views

Industrial drying processes are an energy extensive and often one of the most time consuming processes in a manufacturing line. Optimizing the drying process can therefore lead to a reducing in energy consumption and an increase in manufacturing throughput.

Categories:
485 Views

In the last few years, several organizations have manifested their concern over the increase in use of Hateful Speech or Hate Speech for short, this concept refers to forms of expression or audio-visual content that encourage discrimination or violence against individuals or groups solely based on their gender, sexual orientation, ethnicity, religion or nationality.

Categories:
144 Views

<p>Numerical comparison serves as a major tool in evaluating the performance of optimization algorithms, especially nondeterministic algorithms, but existing methods may suffer from a ‘cycle ranking’ paradox and/or a ‘survival of the nonfittest paradox. This paper searches for paradox-free data analysis methods for numerical comparison. It is discovered that a class of sufficient conditions exist for designing paradox-free analysis. Rigorous modeling and deduction are applied to a class of profile methods employing a filter.

Categories:
131 Views

Pages