.csv

CAPTCHA (Completely Automated Public Turing Tests to Tell Computers and Humans Apart). Only humans can successfully complete this test; current computer systems cannot. It is utilized in several applications for both human and machine identification. Text-based CAPTCHAs are the most typical type used on websites. Most of the letters in this protected CAPTCHA script are in English, it is challenging for rural residents who only speak their native tongues to pass the test.

Categories:
175 Views

4G LTE long-term mobile communications drive test data set. DOI: https://doi.org/10.15783/6gc4-y070

A data set of active 4G LTE measurements via repeated drive tests that covers two years on a typical highway section of 25km length in Austria and contains 267198 data points in total. Each data point includes signal quality metrics, GPS position, GPS time, and instantaneous data rate.

institution :

Salzbury Research (SRFG)

version :

Categories:
230 Views

to predict the Energy consumption in Fuel Cell

Last Updated On: 
Thu, 11/10/2022 - 11:44

Anomaly detection is a well-known topic in cybersecurity. Its application to the Internet of Things can lead to suitable protection techniques against problems such as denial of service attacks.

Categories:
2076 Views

This data set contains measurements on reading and writing data to OPC UA servers directly and via REST and GraphQL interfaces. Each measurement is conducted 1000 times. Measurements include reading a single value and reading 50 values. Measurements using cache server were also performed. Measurement data is collected with Wireshark and the .csv files are exported from it. in addition, .txt files contain request execution times recorded by the client.

Categories:
117 Views

A shortage of beds and cross-infection in hospitals due to patient crowding and overloading during the COVID-19 pandemic necessitate the use of telemedicine over face-to-face treatment. This study used statistical analysis to evaluate the impact of treatment choice among hospitals, patients, and the government to encourage them to employ telemedicine to avoid overload risk in the IoT environment during the pandemic by analyzing data from Tongji Hospital of Wuhan, China from January to September 2020.

Categories:
538 Views

We consider a

large location with M number of grid points, each grid point is labeled with a unique fingerprint consisting of the received signal

strength (RSS) values measured from N number of Bluetooth Low Energy (BLE) beacons. Given the fingerprint observed by the

smartphone, the user’s current location can be estimated by finding the top-k similar fingerprints from the list of fingerprints registered

in the database.

Categories:
270 Views

Shannon’s Index of Difficulty (ID), reputable for quantifying the perceived difficulty of pointing tasks as a logarithmic relationship between movement-amplitude (A) and target-width (W), is used for modelling the corresponding observed movement-times (MT_O) in such tasks in controlled experimental setup.

Categories:
61 Views

Pages