Standards Research Data

The subject of the conducted project was research and development work aimed at developing a product innovation in the form of a robotic hospital ward. The task of such a ward was to minimize the participation of medical personnel in processes requiring contact with the patient, and thus the risk of infections and further spread of viruses.
- Categories:

A high-efficiency energy storage battery technology development project was officially launched, attracting seven experts from different institutions to participate and form a high-efficiency energy storage battery R&D collaboration network. Based on the participants' previous project collaboration experience, three overlapping subgroups naturally formed in the network. After the research and development are completed, the nine members must jointly evaluate the most suitable TT path for the energy storage battery technology.
- Categories:

- MovieLens-1M: This dataset contains user ratings for movies from the MovieLens website. It consists of 6,040 users and 3,952 movies. Users rate movies on a 5-star scale, and for our analysis, we convert the ratings into binary signals (positive and negative feedback) using a threshold of 3.5. The training set contains 456,138 positive feedback interactions and 337,990 negative feedback interactions, while the testing set consists of 111,412 positive feedback interactions.
- Categories:

DALHOUSIE NIMS LAB ATTACK IOT DATASET 2025-1 dataset comprises of four prevalent types attacks, namely Portscan, Slowloris, Synflood, and Vulnerability Scan, on nine distinct Internet of Things (IoT) devices. These attacks are very common on the IoT eco-systems because they often serve as precursors to more sophisticated attack vectors. By analyzing attack vector traffic characteristics and IoT device responses, our dataset will aid to shed light on IoT eco-system vulnerabilities.
- Categories:

This is a videoconference between a witness about murders who is a victim of many crimes and a law firm. This witness is called Colin Paul Gloster. This law firm is called Pais do Amaral Advogados.
\begin{quotation}``A significant part of the background of eh this process is that Hospital
Sobral Cid tortured me during 2013 eh but eh this process is actually
about consequences eh thru through a later process [. . .] To obscure eh
this torture of 2013, eh a new show trial was intitiated. Its process was
- Categories:

Kubernetes is a tool that facilitates rapid deployment of software. Unfortunately, configuring Kubernetes is prone to errors.
Configuration defects are not uncommon and can result in serious consequences. This paper reports an empirical study about
configuration defects in Kubernetes with the goal of helping practitioners detect and prevent these defects. We study 719 defects that
we extract from 2,260 Kubernetes configuration scripts using open source repositories. Using qualitative analysis, we identify 15
- Categories:

1.Cora dataset is derived from a multi-group citation network, and the two-group subgraphs are selected for tasks such as graph neural network node classification. The dataset contains sparse Bag-of-Words feature vectors as node attributes, and the labels are mostly academic paper topic categories or fields. This subgraph focuses on the influence of graph structure and node characteristics on model prediction, which provides a reliable experimental benchmark for the research of multi-step adversarial attacks and defense strategies.
- Categories:

On-demand polarization control of electromagnetic waves is the fundamental element of modern optics. Its interest has recently been expanded in the terahertz (THz) range for coherent excitation of collective quasiparticles in matters, triggering a wide variety of non-trivial intriguing physics, e.g., anharmonicity, nonlinear coupling, and metastability. Wavelength tunability in THz polarization control is fundamentally important for the resonant excitation of collective modes.
- Categories:
Repeated Route Naturalistic Driving Dataset (R2ND2) is a dual-perspective dataset for driver behavior analysis constituent of vehicular data collected using task-specific CAN decoding sensors using OBD port and external sensors, and (b) gaze-measurements collected using industry-standard multi-camera gaze calibration and collection system. Our experiment is designed to consider the variability associated with driving experience that depends on the time of day and provides valuable insights into the correlation of these additional metrics on driver behavior.
- Categories:

In-vehicle networks are responsible for safety-critical control applications, depending on data communication between electronic control units, and most are based on the CAN protocol. A huge amount of data is necessary for reliability, safety, and cybersecurity analysis in today's automotive solutions, especially to feed machine learning models. It is relevant to provide comprehensive datasets about CAN communication and different driving situations, which represents a lack in recent research because most public datasets are very limited.
- Categories: