Machine Learning

Summary: The archive of DCLN project (https://sourceforge.net/projects/dcln/) is provided.

Code & Script: Written in C/C++, running on Linux. Check shell script './dcln.sh' for usage info. The script 'run.sh' relates to the exercises in Section V of the main paper.

Document: Details of hyperparameters tuning, data preprocessing and code compiling are given.

562 views
  • Machine Learning
  • Last Updated On: 
    Mon, 11/18/2019 - 07:13

    This data contains EMG records of forearm movements. this data can be used for the learning process for students and lecturers or researchers. The sensor used to record data is "Myo Arm-Band". The data is equipped with eight features and ends with the arm movement label still using the Indonesian language term.

    89 views
  • Machine Learning
  • Last Updated On: 
    Mon, 11/11/2019 - 00:48

    The development of technology also influences changes in campaign patterns. Campaign activities are part of the process of Election of Regional Heads. The aim of the campaign is to mobilize public participation, which is carried out directly or through social media. Social media becomes a channel for interaction between candidates and their supporters. Interactions that occur during the campaign period can be one indicator of the success of the closeness between voters and candidates. This study aims to get the pattern of campaign interactions that occur on Twitter social media channels.

    64 views
  • Machine Learning
  • Last Updated On: 
    Sun, 11/10/2019 - 04:05

    This data consists of ten gestures. The format is CSV, arranged in thirty features that end with a label. Each movement is repeated five times and the coordinates are obtained. The sensor used is LeapMotion. This data can be used as a means of machine learning exercises. can be used for students learning machine learning subjects. articles that have used this data can be seen at the link: https://doi.org/10.1109/CENIM.2018.8711397

    341 views
  • Machine Learning
  • Last Updated On: 
    Tue, 11/12/2019 - 11:06

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Top-1000 imported functions extracted from the 'pe_imports' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    142 views
  • Machine Learning
  • Last Updated On: 
    Fri, 11/08/2019 - 05:43

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Raw PE byte stream rescaled to a 32 x 32 greyscale image using the Nearest Neighbor Interpolation algorithm and then flattened to a 1024 bytes vector. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    108 views
  • Machine Learning
  • Last Updated On: 
    Thu, 11/07/2019 - 11:45

    This dataset comes up as a benchmark dataset for machines to automatically recognizing the handwritten assamese digists (numerals) by extracting useful features by analyzing the structure. The Assamese language comprises of a total of 10 digits from 0 to 9. We have collected a total of 516 handwritten digits from 52 native assamese people irrespective of their age (12-86 years), gender, educational background etc. The digits are captured in .jpeg format using a paint mobile application developed by us which automatically saves the images in the internal storage of the mobile.

    166 views
  • Computer Vision
  • Last Updated On: 
    Wed, 11/06/2019 - 04:14

    This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data (PE Section Headers of the .text, .code and CODE sections) extracted from the 'pe_sections' elements of Cuckoo Sandbox reports. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

    177 views
  • Machine Learning
  • Last Updated On: 
    Wed, 11/06/2019 - 06:10

    An accurate and reliable image-based quantification system for blueberries may be useful for the automation of harvest management. It may also serve as the basis for controlling robotic harvesting systems. Quantification of blueberries from images is a challenging task due to occlusions, differences in size, illumination conditions and the irregular amount of blueberries that can be present in an image. This paper proposes the quantification per image and per batch of blueberries in the wild, using high definition images captured using a mobile device.

    563 views
  • Artificial Intelligence
  • Last Updated On: 
    Tue, 11/12/2019 - 10:46

    ASNM datasets include records consisting of many features, that express various properties and characteristics of TCP communications. These features are called Advanced Security Network Metrics (ASNM) and were designed with the intention to discern legitimate and malicious connections (especially intrusions).

    92 views
  • Machine Learning
  • Last Updated On: 
    Sun, 11/03/2019 - 01:04

    Pages