Machine Learning

Five well-known Border Gateway Anomalies (BGP) anomalies:
WannaCrypt, Moscow blackout, Slammer, Nimda, Code Red I, occurred in May 2017, May 2005, January 2003, September 2001, and July 2001, respectively.
The Reseaux IP Europeens (RIPE) BGP update messages are publicly available from the Network Coordination Centre (NCC) and contain:
WannaCrypt, Moscow blackout, Slammer, Nimda, Code Red I, and regular data: https://www.ripe.net/analyse/.

Categories:
1283 Views

Since there is no image-based personality dataset, we used the ChaLearn dataset for creating a new dataset that met the characteristics we required for this work, i.e., selfie images where only one person appears and his face is visible, labeled with the person's apparent personality in the photo.

Categories:
3470 Views

the measurement data  simulated data of Hd-TCP and its comparisons' performance on the real high-speed railways scenario

Categories:
521 Views

These datasets are used to detect Intrusions in Controller Area Network (CAN) bus. Intrusions are detected using various Machine Learning and Deep Learning algorithms.

.

Categories:
2531 Views

monitoring, processing and prediction data

Categories:
419 Views

ArPC is an Arabic paraphrase identification corpus. It consists of 1331 sentence pairs along with their binary score that indicates weather the pairs are paraphrase or not. The corpus has been manually annotated by three Arabic native speakers.

Categories:
752 Views

The PMMW real-time imager, SAIR-U, is developed by Microwave Laboratory of Beihang University, China.It could be (or has been) used in non-contact, non-cooperative (i.e. no need for a fixed posture) security, especially in the environment of large passenger flow. This is the dataset used in the experiment in paper"Real-time Concealed Object Detection from Passive Millimeter Wave Images Based on YOLOv3 Algorithm"

Categories:
251 Views

The PMMW real-time imager, SAIR-U, is developed by Microwave Laboratory of Beihang University, China.It could be (or has been) used in non-contact, non-cooperative (i.e. no need for a fixed posture) security, especially in the environment of large passenger flow. This is the dataset used in the experiment in paper"Real-time Concealed Object Detection from Passive Millimeter Wave Images Based on YOLOv3 Algorithm"

Categories:
239 Views

The dataset corresponds to the variables that affect the process of passing the sheet between rodsizer and the spooner section for a paper machine.

Categories:
552 Views

Research on damage detection of road surfaces has been an active area of research, but most studies have focused so far on the detection of the presence of damages. However, in real-world scenarios, road managers need to clearly understand the type of damage and its extent in order to take effective action in advance or to allocate the necessary resources. Moreover, currently there are few uniform and openly available road damage datasets, leading to a lack of a common benchmark for road damage detection.

Categories:
4072 Views

Pages