Latest Update: | 2025-10-13 | Samples: | 2000 records |
Samples: | 2000 records | ||
File Size: | 1.5G | Format: | JPG/PNG/JSON |
Format: | JPG/PNG/JSON | ||
Data Domain: | Image | Holder: | ![]() |
Holder: | ![]() | ||
Industry Scope: | defect detection | quality assurance | industrial inspection | ||
Applications: | image classification | object detection |
Image | File Name | Resolution | Defect Type | Defect Location | Defect Severity | Power Cord Color | Plug Type | Material Type |
---|---|---|---|---|---|---|---|---|
![]() | 89df4ae5fed9ecb167bc22a684bcd3f2.png | 1173*1500 | twist | plug pins | none | no connection power cable | two-pin | plastic |
![]() | c07e4238e2db627e1182d2d5cfd70c2f.png | 1230*1500 | twist | plug pins | none | no power cable | two-pin | plastic |
![]() | c84f634071edfc5a689e0d542b4ca970.png | 1129*1500 | twist | plug pins | moderate | not visible | three-pin | plastic and metal |
![]() | b9bd4f4714a0b8206bbdd4b41d8e72f1.png | 1076*1500 | Twisted | Plug Pins | None | Black | Two-pin | Plastic |
![]() | 14c990ee4f05d83273d085d73a32d942.png | 909*1500 | Twisted | Metal Pins of Plug | Moderate | White | Two-pin | Plastic |
Field | Type | Description |
---|---|---|
file_name | string | File name |
quality | string | Resolution |
defect_type | string | Types of plug defects that may occur, such as cracks, twists, etc. |
defect_location | string | Description of the defect location on the plug |
defect_severity | string | Qualitative description of defect severity, such as minor, moderate, severe |
cable_color | string | Information about the color of the power cord connected to the plug. |
plug_type | string | The type of plug, such as two-pin or three-pin. |
material_type | string | The material of the plug and power cord, such as plastic or rubber. |
Item | Content |
---|---|
Authorization Type | CC-BY-NC-SA 4.0 (Attribution–NonCommercial–ShareAlike) |
Commercial Use | Requires exclusive subscription or authorization contract (monthly or per-invocation charging) |
Privacy and Anonymization | No PII, no real company names, simulated scenarios follow industry standards |
Compliance System | Compliant with China’s Data Security Law / EU GDPR / supports enterprise data access logs |
Post a request and let data providers reach out to you.