Center for Machine Learning and Intelligent Systems
About  Citation Policy  Donate a Data Set  Contact


Repository Web            Google
View ALL Data Sets

Browse Through:

Default Task

Classification (6)
Regression (3)
Clustering (5)
Other (0)

Attribute Type

Categorical (0)
Numerical (4)
Mixed (1)

Data Type

Multivariate (9)
Univariate (1)
Sequential (0)
Time-Series (0)
Text (0)
Domain-Theory (1)
Other (0)

Area - Undo

Life Sciences (13)
Physical Sciences (3)
CS / Engineering (10)
Social Sciences (2)
Business (5)
Game (1)
Other (6)

# Attributes - Undo

Less than 10 (10)
10 to 100 (7)
Greater than 100 (9)

# Instances - Undo

Less than 100 (4)
100 to 1000 (10)
Greater than 1000 (14)

Format Type - Undo

Matrix (10)
Non-Matrix (5)

10 Data Sets

Table View  List View


1. Energy efficiency: This study looked into assessing the heating load and cooling load requirements of buildings (that is, energy efficiency) as a function of building parameters.

2. User Knowledge Modeling: It is the real dataset about the students' knowledge status about the subject of Electrical DC Machines. The dataset had been obtained from Ph.D. Thesis.

3. Computer Hardware: Relative CPU Performance Data, described in terms of its cycle time, memory size, etc.

4. Perfume Data: This data consists of odors of 20 different perfumes. Data was obtained by using a handheld odor meter (OMX-GR sensor) per second for 28 seconds period.

5. Servo: Data was from a simulation of a servo system

6. Qualitative_Bankruptcy: Predict the Bankruptcy from Qualitative parameters from experts.

7. AAAI 2014 Accepted Papers: This data set compromises the metadata for the 2014 AAAI conference's accepted papers, including paper titles, authors, abstracts, and keywords of varying granularity.

8. AAAI 2013 Accepted Papers: This data set compromises the metadata for the 2013 AAAI conference's accepted papers (main track only), including paper titles, abstracts, and keywords of varying granularity.

9. Dishonest Internet users Dataset: The dataset was used to test an architecture based on a trust model capable to cope with the evaluation of the trustworthiness of users interacting in pervasive environments.

10. BLOGGER: In this paper, we look for to recognize the causes of users tend to cyber space in Kohkiloye and Boyer Ahmad Province in Iran


Supported By:

 In Collaboration With:

About  ||  Citation Policy  ||  Donation Policy  ||  Contact  ||  CML