This dataset contains about 140,000 Tweets related to exoskeletons. that were mined for a period of 5-years from May 21, 2017, to May 21, 2022. The tweets contain diverse forms of communications and conversations which communicate user interests, user perspectives, public opinion, reviews, feedback, suggestions, etc., related to exoskeletons.


The dataset contains only tweet identifiers (Tweet IDs) due to the terms and conditions of Twitter to re-distribute Twitter data ONLY for research purposes. They need to be hydrated to be used. The process of retrieving a tweet's complete information (such as the text of the tweet, username, user ID, date and time, etc.) using its ID is known as the hydration of a tweet ID. For hydrating this dataset the Hydrator application (link to download and a step-by-step tutorial on how to use Hydrator) may be used.


Data Description

This dataset consists of 7 .txt files. The following shows the number of Tweet IDs and the date range (of the associated tweets) in each of these files. 

Filename: Exoskeleton_TweetIDs_Set1.txt

Number of Tweet IDs – 22945, Date Range of Tweets - July 20, 2021 – May 21, 2022

Filename: Exoskeleton_TweetIDs_Set2.txt

Number of Tweet IDs – 19416, Date Range of Tweets - Dec 1, 2020 – July 19, 2021

Filename: Exoskeleton_TweetIDs_Set3.txt

Number of Tweet IDs – 16673, Date Range of Tweets - April 29, 2020 - Nov 30, 2020

Filename: Exoskeleton_TweetIDs_Set4.txt

Number of Tweet IDs – 16208, Date Range of Tweets - Oct 5, 2019 - Apr 28, 2020

Filename: Exoskeleton_TweetIDs_Set5.txt

Number of Tweet IDs – 17983, Date Range of Tweets - Feb 13, 2019 - Oct 4, 2019

Filename: Exoskeleton_TweetIDs_Set6.txt

Number of Tweet IDs – 34009, Date Range of Tweets - Nov 9, 2017 - Feb 12, 2019

Filename: Exoskeleton_TweetIDs_Set7.txt

Number of Tweet IDs – 11351, Date Range of Tweets - May 21, 2017 - Nov 8, 2017


For any questions related to the dataset, please contact Nirmalya Thakur at thakurna@mail.uc.edu


The Web is essential for education and e-learning. This situation has been boosted by migration to distance education due to the SARS-CoV-2. However, students with disabilities have been seriously affected because online teaching is very often not accessible. For this reason, this research aims to evaluate the accessibility of the home pages of the web portals of the Ecuadorian higher education institutions ranked in the Webometrics with the Web Content Accessibility Guidelines (WCAG) 2.1 of the World Wide Web Consortium.


The lack of accessibility on websites can result in people with disabilities not accessing information online. Therefore, this research aims to create a process model for continuous web accessibility testing by adapting and customizing three methodologies: Deming cycle (Plan, Do, Check, Act), Website Accessibility Conformance Evaluation Methodology (WCAG-EM), and Total Quality Management. The process model is composed of four phases.


The broadening of the scope of application of the MARPOR ideological estimation method for South America resulted in positioning of Argentine, Brazilian and Chilean partisan manifestos further to the left than what is generally classified by specialists. Objective to assess the adequacy of the MARPOR standard method to estimate the ideological position of the manifestos of these countries, this study concluded that this presents inaccuracies in the construction of the RILE scale.


Catalogue of Government Affairs Documents of Shanghai Archives


The dataset contains hurricane Maria-induced outage duration at the barrio level derived from nighttime lights, along with the values of cofactors from socioeconomic and physical factors that influenced the recovery process. 


The data set contains inspections conducted by the Norwegian Labour Inspection Authority (NLIA) between 2012 and 2019. Each row in the dataset contains a control point, non-compliance indicator for the control point and industry code / municipality / county of the inspected organisation.


Target label: Non-Compliance.


The presence of organisations in Online Social Networks (OSNs) has motivated malicious users to look for attack vectors, which are then used to increase the possibility of carrying out successful attacks and obtaining either private information or access to the organisation. This article hypothesised that organisations have specific languages that their members use in OSNs, which malicious users could potentially use to carry out an impersonation attack.


The dataset used for blockchain technology adoption by financial institutions.