*.avi; *.jpg; *.csv; *.txt; *.m
This code accompanies the paper titled "An End-to-End Modular Framework for Radar Signal Processing: A Simulation-Based Tutorial," published in IEEE Aerospace and Electronics Systems Magazine (DOI:10.1109/MAES.2023.3334689). The simulation of a complete radar has been performed, and the results have been shown after each stage/module of a radar, enabling the reader to appreciate the impact of the specific process on the radar signal.
- Categories:
This dataset contains the measurement in an ultrawide band (UWB) system in the 6.5 GHz band, considering the presence of the human body as the only obstacle. There are measurements in line-of-sight condition to compare the results of the analysis performed. The measurements are part of our research on the adverse effects of the body shadowing in pedestrian localization systems. The measurements were obtained in three distinct scenarios.
- Categories:
In this brief, the distributed cubature information filtering method is proposed to solve the state estimation problem of target in passive sensor network. Firstly, the observation system model of bearing-only sensor network is established and analysised. The sensor node pairs only measure the relative angle information, and then the state estimation of the target is realized based on the DCIF algorithm.
- Categories:
Future IPv6-based networks face a significant security challenge with ICMPv6 communications. An attacker uses ICMPV6 messages to saturate the target system and aims to implement a Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack. A robust intrusion detection system is being developed by researchers to address these issues. Researchers have access to a restricted number of IPv6 datasets to construct a well-known intrusion detection system, however these datasets are not accessible to the public and only target on one kind of attack.
- Categories:
There exist several commonly used datasets in relation to object detection that include COCO (with multiple versions) and ImageNet containing large annotations for 80 and 1000 objects (i.e. classes) respectively. However, very limited datasets are available comprising specific objects identified by visually imapeired people (VIP) such as wheel-bins, trash-Bags, e-Scooters, advertising boards, and bollard. Furthermore, the annotations for these objects are not available in existing sources.
- Categories:
The dataset contains the navigation measurements obtained in the indoor experiment field. The volunteers move on the whole 4th floor of the Building D of Dong Jiu Teaching classes at Huazhong University of Science and Technology. Meanwhile, the experimental area consists of a total area of 717 m 2. These datasets were used and can be used to test and validate the radio map database updating-based localization positioning algorithm through the RSSI signals space.
- Categories:
The region-based segmentation approach has been a major research area for many medical image applications. A vision guided autonomous system has used region-based segmentation information to operate heavy machinery and locomotive machines intended for computer vision applications. The dataset contains raw images in .png format fro brain tumor in various portions of brain.The dataset can be used fro training and testing. Images are calssified into three main regions as frontal lobe(level -1, level-2), optus-lobe(level-1), medula_lobe(level-1,level-2,level-3).
- Categories:
Pen testing the method to evaluate the security of an application or network by safely exploiting any security vulnerabilities present in the system. These security flaws can be present in various areas such as system configuration settings, login methods, and even end-users risky behaviors.
- Categories: