*.avi; *.jpg; *.csv; *.txt; *.m
In this brief, the distributed cubature information filtering method is proposed to solve the state estimation problem of target in passive sensor network. Firstly, the observation system model of bearing-only sensor network is established and analysised. The sensor node pairs only measure the relative angle information, and then the state estimation of the target is realized based on the DCIF algorithm.
- Categories:
There exist several commonly used datasets in relation to object detection that include COCO (with multiple versions) and ImageNet containing large annotations for 80 and 1000 objects (i.e. classes) respectively. However, very limited datasets are available comprising specific objects identified by visually imapeired people (VIP) such as wheel-bins, trash-Bags, e-Scooters, advertising boards, and bollard. Furthermore, the annotations for these objects are not available in existing sources.
- Categories:
The dataset contains the navigation measurements obtained in the indoor experiment field. The volunteers move on the whole 4th floor of the Building D of Dong Jiu Teaching classes at Huazhong University of Science and Technology. Meanwhile, the experimental area consists of a total area of 717 m 2. These datasets were used and can be used to test and validate the radio map database updating-based localization positioning algorithm through the RSSI signals space.
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
The region-based segmentation approach has been a major research area for many medical image applications. A vision guided autonomous system has used region-based segmentation information to operate heavy machinery and locomotive machines intended for computer vision applications. The dataset contains raw images in .png format fro brain tumor in various portions of brain.The dataset can be used fro training and testing. Images are calssified into three main regions as frontal lobe(level -1, level-2), optus-lobe(level-1), medula_lobe(level-1,level-2,level-3).
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/cloud-computing-2001090_1920.jpg?itok=-t8zAaCz)
Pen testing the method to evaluate the security of an application or network by safely exploiting any security vulnerabilities present in the system. These security flaws can be present in various areas such as system configuration settings, login methods, and even end-users risky behaviors.
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/power-poles-503935_1920.jpg?itok=RTAUk4M_)
Unit commitment and system data used in the following research paper:
G. Gutiérrez-Alcaraz, B. Díaz-López, J. M. Arroyo, and V. H. Hinojosa, “Large-scale preventive security-constrained unit commitment considering N-k line outages and transmission losses: System data.”
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
....
- Categories:
![](https://ieee-dataport.org/sites/default/files/styles/3x2/public/tags/images/artificial-intelligence-2167835_1920.jpg?itok=wAd0kf8k)
....
- Categories: