Machine Learning

Jamming devices pose a significant threat by disrupting signals from the global navigation satellite system (GNSS), compromising the robustness of accurate positioning. Detecting anomalies in frequency snapshots is crucial to counteract these interferences effectively. The ability to adapt to diverse, unseen interference characteristics is essential for ensuring the reliability of GNSS in real-world applications. We recorded a dataset with our own sensor station at a German highway with eight interference classes and three non-interference classes.

Categories:
151 Views

Optical remote sensing images, with their high spatial resolution and wide coverage, have emerged as invaluable tools for landslide analysis. Visual interpretation and manual delimitation of landslide areas in optical remote sensing images by human is labor intensive and inefficient. Automatic delimitation of landslide areas empowered by deep learning methods has drawn tremendous attention in recent years. Mask R-CNN and U-Net are the two most popular deep learning frameworks for image segmentation in computer vision.

Categories:
62 Views

The ULTRRA challenge evaluates current and novel state of the art view synthesis methods for posed and unposed cameras. Challenge datasets emphasize real-world considerations, such as image sparsity, variety of camera models, and unconstrained acquisition in real-world environments.

Last Updated On: 
Thu, 11/21/2024 - 06:44

Since the aircraft trajectory data in the field of air traffic management typically lacks labels, it limits the community's ability to explore classification models. Consequently, evaluations of clustering models often focus on the correctness of cluster assignment rather than merely the closeness within the cluster. To address this, we labeled the dataset for both classification and clustering tasks by referring to aeronautical publications. The process of obtaining the ATFM trajectory dataset consists of data sourcing, preprocessing, and annotation.

Categories:
140 Views

This dataset used in the research paper "JamShield: A Machine Learning Detection System for Over-the-Air Jamming Attacks." The research was conducted by Ioannis Panitsas, Yagmur Yigit, Leandros Tassiulas, Leandros Maglaras, and Berk Canberk from Yale University and Edinburgh Napier University.

For any inquiries, please contact Ioannis Panitsas at ioannis.panitsas@yale.edu.

 

Categories:
144 Views

We used the broad group of 47,692 tweets from the Cyberbullying Classification dataset. This worldwide sourced dataset offers a broad range of examples of cyberbullying, guaranteeing a thorough viewpoint. Our thorough translation and modification procedure guaranteed the dataset's contextual and cultural relevance for the Tamil-speaking population, even though it is not solely from South Asia. These tweets were carefully divided into six classes, each of which represented a different facet of cyberbullying, as well as cases that weren't considered cyberbullying.

Categories:
373 Views

The Theory of Integrated Language Learning (ToILL) supports many complementary schools of educational thought. The constructivism, pragmatism, humanism, and sociocultural theory are combined in one process to produce an integrated and successful method of language acquisition. The approach promotes the complete person development in a continuously changing environment that is global in nature but does not stop at cognitive components but also concerns the social and emotional experiences of the students.

Categories:
254 Views

This dataset originates from a longitudinal study examining the factors contributing to the progression of cardiovascular disease. P This particular research employs the unprocessed sequential actigraph recordings collected from an actigraph device. We evaluate sleep quality based on the two indicators as proposed in our previous study [3] which are weekly sleep quality ‘SleepQualWeek’, and sleep consistency ‘SleepCons’. SleepQualWeek and SleepCons are calculated using the pre-processed attribute set derived from the MESA dataset. 

Categories:
131 Views

The example involves 16 evaluation criteria, with quantitative criteria including on time delivery (C1), delivery speed (C2), accurate delivery (C3), damaged cargo proportion (C4), after-sale service (C5), clearance efficiency (C6), geographical coverage (C7), bonded warehouse support (C8), delivery price (C12), and transport cost (C13), and qualitative criteria including flexibility in delivery and operations (C9), information system (C10), information sharing (C11), reputation (C14), financial performance (C15), and R&D ability (C16).

Categories:
46 Views

To assist individuals in sports activities is one of the emerging areas of wearable applications. Among various kinds of sports, detecting tennis strokes faces unique challenges. we propose an approach to detect three tennis strokes (backhand, forehand, serve) by utilizing a smartwatch. In our method, the smartwatch is part of a wireless network in which inertial data file is transferred to a laptop where data prepossessing and classification is performed. The data file contains acceleration and angular velocity data of the 3D accelerometer and gyroscope.

Categories:
407 Views

Pages