This is the First Arabic voice Commands Dataset to provide personalized control of devices at smart homes for elder persons and persons with disabilities. The dataset contains 12 speakers, each saying 36 different phrases or words in Arabic language. The goal of this dataset is to use it in an Arabic smart home system to control home devices through voice. Participants were asked to say each phrase multiple times. The phrases to record were presented in a random order.

Categories:
31 Views

<p>The proliferation of efficient edge computing has enabled a paradigm shift of how we monitor and interpret urban air quality. Coupled with the dense spatiotemporal resolution realized from large-scale wireless sensor networks, we can achieve highly accurate realtime local inference of airborne pollutants. In this paper, we introduce a novel Deep Neural Network architecture targeted at latent time-series regression tasks from continuous, exogenous sensor measurements, based on the Transformer encoder scheme and designed for deployment on low-cost power-efficient edge processors.

Categories:
13 Views

In this project, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including, Cloud Computing Layer, Network Functions Virtualization Layer, Blockchain Network Layer, Fog Computing Layer, Software-Defined Networking Layer, Edge Computing Layer, and IoT and IIoT Perception Layer.

Categories:
196 Views

With the current footprint of the embedded IoT industries, there is a huge requirement to understand and analyze the existing IoT boards to provide the future IoT board manufacturers with a direction of research and development.

This datasheet contains the comparative architectural survey of 60 computing boards from the rapid prototyping industries. This dataset was collected directly from the manufacturers’ datasheet. The motivation to build this dataset is to analyze the current advancements in the IoT industries to reflect the future architectural designs of various boards.

Categories:
20 Views

Power system state estimation (PSSE) plays a vital role in stable operation of modern smart grids, while it is vulnerable to cyber attacks. False data injection attacks (FDIA), one of the most common cyber attacks, can tamper with measurement data and bypass the bad data detection (BDD) mechanism, leading to incorrect PSSE results.

Categories:
33 Views

This dataset contains 22 blocks which are designed based on Scratch programming tool for children. These blocks are flagged by HCI experts and primary schooll teachers as "Usefule" and "Understandable".

The usefulness of the blocks are measured based on a task list provided in a brainstorming session with children of age 8-12.

Categories:
21 Views

This dataset contains usability evaluation raw data of the "Child-Home Interaction: Design and Usability Evaluation of Game-based End-user Development for Children" paper.

Categories:
51 Views

This is the source code and dataset of the paper "Double QoS Guarantee for NOMA-Enabled

Massive MTC Networks".

Categories:
40 Views

The dataset originally was taken from DAIAD, which has the mechanism to monitor the water consumption in real time using a validated platform for different cities. These datasets had the record of different water consumption values taken from the smart water meters that indicates, total water consumption by different users in Litres with the time interval of one hour for a year.

Categories:
514 Views

It is now widely known fact that the Cloud computing and Software defined network paradigms have received a wide acceptance from researchers, academia and the industry. But the wider acceptance of cloud computing and SDN paradigms are hampered by increasing security threats. One of the several facts is that the advancements in processing facilities currently available are implicitly helping the attackers to attack in various directions. For example, it is visible that the conventional DoS attacks are now extended to cloud environments as DDoS attacks.

Categories:
385 Views

Pages