3,002 Works

audio steganalysis dataset

yuntao wang, Kun Yang, Xiaowei Yi & Xianfeng Zhao
This is a dataset for audio steganalysis.

Audio Steganalysis Dataset

yuntao wang, Kun Yang, Xiaowei Yi & Xianfeng Zhao
This is a dataset for audio steganalysis.

THz_TCAD_model_2019

Xueqing Liu
This dataset is for the manuscript "TCAD model for TeraFET detectors operating in a large dynamic range" submitted toIEEE Transactions on Terahertz Science and Technology.

A Hysteresis-Controlled Buck Converter with Active Pseudo-Current and Frequency-Locked Techniques

Jiann-Jong Chen
The paper presents a hysteresis-controlled buck converter with active pseudo-current and frequency-locked techniques. The hysteresis-controlled method accelerates the transient response in the load variation. The proposed buck converter uses phase-frequency locked technique to solve the variable switching frequency and electromagnetic disturbance problems. Therefore, the frequency-locked circuit is used to fix the switching frequency. The stable output voltage is important, when the input or output voltage is changed. This condition can be benefited by the current...

Bitcoin Scanner Data (2018)

Sehyun Park, Seongwon Im, Youhwan Seol & Jeongyeup Paek
Bitcoin is a decentralized digital currency that has gained significant attention and growth in recent years. Unlike traditional currencies, Bitcoin does not rely on a centralized authority to control the supply, distribution, and verification of the validity of transactions. Instead, Bitcoin relies on a peer-to- peer network of volunteers to distribute pending transactions and confirmed blocks, verify transactions, and to collectively implement a replicated ledger that everyone agrees on. This peer-to-peer (P2P) network is at...

By-example data query for AutomationML using tree patterns

Yingbing Hua
This data set contains explementary data to demonstrate the utility of By-example data query in AutomationML

Audio Steganalysis Dataset

Yuntao Wang, Kun Yang, Yunzhao Yang, Zhenyu Zhang, Xiaowei Yi & Xianfeng Zhao
Audio steganography and steganalysis have drawn increasing attention in recent years, however, there is no standard public dataset. To promote this study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s, and this dataset is aimed at MP3 steganalysis at this stage. All audio files are from Internet through data crawling, which is for a better simulation of real detection environment. We...

Demands for bus ridesharing in Shanghai, China, feb 20, 2007.

Kaijun Liu
This is the dataset used in the experiment of paper "Bus-Pooling: A Large-Scale Bus Ridesharing Service". The dataset contains 4,891,984 trajectory data from 4,000 Shanghai taxis from one day (Feb 20, 2007), and 66,369 trips are extracted from the trajectory data. The 100 groups of coordinate sets containing three coordinates as experimental samples are used to compare the effectiveness and efficiency of location-allocation algorithms. Each set of coordinates is the pickup and delivery point randomly...

Demands for bus ridesharing in Shanghai, China, feb 20, 2007.

Kaijun Liu
This is the dataset used in the experiment of paper "Bus-Pooling: A Large-Scale Bus Ridesharing Service". The dataset contains 4,891,984 trajectory data from 4,000 Shanghai taxis from one day (Feb 20, 2007), and 66,369 trips are extracted from the trajectory data. The 100 groups of coordinate sets containing three coordinates as experimental samples are used to compare the effectiveness and efficiency of location-allocation algorithms. Each set of coordinates is the pickup and delivery point randomly...

Demands for bus ridesharing in Shanghai, China, feb 20, 2007.

Kaijun Liu
This is the dataset used in the experiment of paper "Bus-Pooling: A Large-Scale Bus Ridesharing Service". The dataset contains 4,891,984 trajectory data from 4,000 Shanghai taxis from one day (Feb 20, 2007), and 66,369 trips are extracted from the trajectory data. The 100 groups of coordinate sets containing three coordinates as experimental samples are used to compare the effectiveness and efficiency of location-allocation algorithms. Each set of coordinates is the pickup and delivery point randomly...

Dataset for Paper \"A Hybrid Event Detection Approach for Non-Intrusive Load Monitoring\"

Zuyi Li & Mengqi Lu
This dataset is for the figures and the plots within the figures in the submitted paper "A hybrid event detection approach for non-intrusive load monitoring."Non-Intrusive Load Monitoring (NILM) is a practical method to provide appliance-level electricity consumption information. Event detection, as an important part of event-based NILM methods, has a direct impact on the accuracy of the ultimate load disaggregation results in the entire NILM framework. This paper presents a hybrid event detection approach for...

Estimation of Switching Surge Flashover Rate for a 1200 kV UHVAC Transmission Line by Considering Switching Overvoltage Wave shape

Ramchandra Reddy
The insulation of the power transmission systems experience stresses due to overvoltages and hence the insulation design of Extra High Voltage and Ultra High Voltage systems depend on the switching overvoltages rather than lightning overvoltages. Insulation failure probability under switching overvoltages is the main impressive concern in the estimation of switching surge flashover rate. . In this paper a new method is used to estimate the switching surge flashover rate of insulation under switching overvoltages...

Robust website FIngerprinting Through the Cache Occupancy Channel

Anatoly Shusterman
Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the secure network. In this work we investigate these attacks under a different attack model, in which the...

Audio Steganalysis Dataset

Yuntao Wang, Kun Yang, Yunzhao Yang, Zhenyu Zhang, Xiaowei Yi & Xianfeng Zhao
The steganography and steganalysis of audio, especially compressed audio, have drawn increasing attention in recent years, and various algorithms are proposed. However, there is no standard public dataset for us to verify the efficiency of each proposed algorithm. Therefore, to promote the study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s. And, all audio files are from the Internet through data...

Audio Steganalysis Dataset

Yuntao Wang, Kun Yang, Yunzhao Yang, Zhenyu Zhang, Xiaowei Yi & Xianfeng Zhao
The steganography and steganalysis of audio, especially compressed audio, have drawn increasing attention in recent years, and various algorithms are proposed. However, there is no standard public dataset for us to verify the efficiency of each proposed algorithm. Therefore, to promote the study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s. And, all audio files are from the Internet through data...

Charge and Discharge cycle pattern

Mina Abedi Varnosfaderani, Dani Strickland, Martin Ruse & Enrique Brana Castillo
This paper looks at six different applications for a domestically located battery system and determines how these could be translated into different electrical power application “drive” cycles. The applications considered are as follows: 1) a house with four people and a solar panel using the battery to absorb extra energy when the PV panel is producing more power than is absorbed in the house and then releasing this energy afterwards. 2) A house with four...

A Hybrid Key Generation and a Verification Scheme Dataset

Yalda Khosroshahi, Ozan Alp Topal & Nasim Tavakkoli
By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used. In the current key verification techniques, the legitimate...

A Hybrid Key Generation and a Verification Scheme Dataset

Yalda Khosroshahi, Ozan Alp Topal & Nasim Tavakkoli
By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used. In the current key verification techniques, the legitimate...

Assembly Audio System ( ASSM AUDIO) - Project 1

OKSANG JIN
We propose a new concept audio system, It is an audio system with slots for inserting function units in one main body. It is a group for producing the first product for standardization. (Network audio player, DDC, DAC, PHONO equalizer, PRE Amplifier, POWER Amplifier, POWER SUPPLY, etc.) The internal main board has slots for inserting the unit, and the corresponding unit can be installed and replaced with another compatible unit. Function units are made in...

Assembly Audio System ( ASSM AUDIO) - Project 1

OKSANG JIN
We propose a new concept audio system, It is an audio system with slots for inserting function units in one main body. It is a group for producing the first product for standardization. (Network audio player, DDC, DAC, PHONO equalizer, PRE Amplifier, POWER Amplifier, POWER SUPPLY, etc.) The internal main board has slots for inserting the unit, and the corresponding unit can be installed and replaced with another compatible unit. Function units are made in...

Assembly Audio System ( ASSM AUDIO) - Project 1

OKSANG JIN
We propose a new concept audio system, It is an audio system with slots for inserting function units in one main body. It is a group for producing the first product for standardization. (Network audio player, DDC, DAC, PHONO equalizer, PRE Amplifier, POWER Amplifier, POWER SUPPLY, etc.) The internal main board has slots for inserting the unit, and the corresponding unit can be installed and replaced with another compatible unit. Function units are made in...

High quality sound amplification technology - DataSet

OKSANG JIN
This Group aims to improve the sound characteristics of the output signal from the audio viewpoint when the silicon transistor is used in the acoustic amplifier circuit in the acoustical equipment field.When using a silicon transistor in an acoustic amplifier circuit, the sound output is known to be cool, rough, sharp, and not abundant. So audio enthusiasts still like amplifiers that use vacuum tubes. Audio enthusiasts have an excellent ability to judge sound quality because...

SIAT-PJND:Picture-level Just Noticeable Difference based stereo image dataset

Chunling Fan, Yun Zhang, Huan Zhang, Raouf Hamzaoui & Qingshan Jiang
We study the Picture-level Just Noticeable Difference (PJND) of symmetrically and asymmetrically compressed stereoscopic images for JPEG2000 and H.265 intra coding.We conduct interactive subjective quality assessment tests to determine the PJND point using both a pristine image and a distorted image as a reference.We generate two PJND-based stereo image datasets, including Shenzhen Institutes of Advanced Technology-picture-level Just noticeable difference-based Symmetric Stereo Image dataset (SIAT-JSSI)and picture-level Just noticeable difference-based Asymmetric Stereo Image dataset (SIAT-JASI). Each dataset...

Sample Test Results (RPS=110)

Zhe Xiao
The performance testing sample results for RPS = 110 (with the maximum TPS = ~ 350 achieved) for manuscript "Blockchain and IoT for Insurance: A Case Study and Cyberinfrastructure Solution on Fine-grained Transportation Insurance"

Date Fruit Dataset for Automated Harvesting and Visual Yield Estimation

Hamdi Altaheri, Mansour Alsulaiman, Mohammed Faisal & Ghulam Muhammed
The date fruit dataset was created to address the requirements of many applications in the pre-harvesting and harvesting stages. The two most important applications among them are automatic harvesting and visual yield estimation. The dataset is divided into two subsets and each of them is oriented into one of these two applications. The first dataset consists of 8079 images of more than 350 date bunches captured from 29 date palms. The date bunches belong to...

Registration Year

  • 2019
    3,002

Resource Types

  • Dataset
    3,002