Security

This dataset is in support of my 2 research papers - 'Short Circuit Analysis of 72Ah Li-Ion BMC - Part I' and 'Short Circuit Analysis of 72Ah Li-Ion BMC - Part II'.

 Faults and datasets can be copied to submit in fire cause investigation reports or thesis. 

This dataset is a collection of data of battery and BMC  faults. 

Categories:
5377 Views

This dataset is used to design patent.  The system is basic , as can be seen from figure.

As the boost converter, BMS is on existing designs.It is very simple for any graduate,degree holder or school students, so no paper is written for it.

There is related dataset-Data: Fifteen 255W Panels Connected Li-Ion

Categories:
4680 Views

 This dataset is in support of my research paper 'Comparative Control Loop Stability & Eigen Analysis of Transfer Functions in 7.5 Hp BLDC Sensorless SMO'.

Preprint :

Categories:
6996 Views

This FFT-75 dataset contains randomly sampled, potentially overlapping file fragments from 75 popular file types (see details below). It is the most diverse and balanced dataset available to the best of our knowledge. The dataset is labeled with class IDs and is ready for training supervised machine learning models. We distinguish 6 different scenarios with different granularity and provide variants with 512 and 4096-byte blocks. In each case, we sampled a balanced dataset and split the data as follows: 80% for training, 10% for testing and 10% for validation.

Categories:
3399 Views

This dataset contains the library call lists obtained from programs implemented by using libiec61850. Call lists are marked either as benign, or according to the name of the attack.

Categories:
188 Views

This dataset details the state machine based experiments of PowerWatch.

Categories:
274 Views

Modern technologies have made the capture and sharing of digital video commonplace; the combination of modern smartphones, cloud storage, and social media platforms have enabled video to become a primary source of information for many people and institutions. As a result, it is important to be able to verify the authenticity and source of this information, including identifying the source camera model that captured it. While a variety of forensic techniques have been developed for digital images, less research has been conducted towards the forensic analysis of videos.

Categories:
1122 Views

Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the secure network.

Categories:
1011 Views

Data for the article in the Transactions on Industrial Informatics

Categories:
230 Views

The steganography and steganalysis of audio, especially compressed audio, have drawn increasing attention in recent years, and various algorithms are proposed. However, there is no standard public dataset for us to verify the efficiency of each proposed algorithm. Therefore, to promote the study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s. And, all audio files are from the Internet through data crawling, which is for a better simulation of a real detection environment.

Categories:
3397 Views

Pages