*.avi; *.jpg; *.csv; *.txt; *.m

This code accompanies the paper titled "An End-to-End Modular Framework for Radar Signal Processing: A Simulation-Based Tutorial," published in IEEE Aerospace and Electronics Systems Magazine (DOI:10.1109/MAES.2023.3334689). The simulation of a complete radar has been performed, and the results have been shown after each stage/module of a radar, enabling the reader to appreciate the impact of the specific process on the radar signal.

Categories:
156 Views

This dataset contains the measurement in an ultrawide band (UWB) system in the 6.5 GHz band, considering the presence of the human body as the only obstacle. There are measurements in line-of-sight condition to compare the results of the analysis performed. The measurements are part of our research on the adverse effects of the body shadowing in pedestrian localization systems. The measurements were obtained in three distinct scenarios.

Categories:
787 Views

In this brief, the distributed cubature information filtering method is proposed to solve the state estimation problem of target in passive sensor network. Firstly, the observation system model of bearing-only sensor network is established and analysised. The sensor node pairs only measure the relative angle information, and then the state estimation of the target is realized based on the DCIF algorithm.

Categories:
59 Views

Future IPv6-based networks face a significant security challenge with ICMPv6 communications. An attacker uses ICMPV6 messages to saturate the target system and aims to implement a Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack. A robust intrusion detection system is being developed by researchers to address these issues. Researchers have access to a restricted number of IPv6 datasets to construct a well-known intrusion detection system, however these datasets are not accessible to the public and only target on one kind of attack.

Categories:
159 Views

This  is a regional time-series image datasets, which contains four regions in WRS-2 (36/129 region, 36/130 region, 37/129 region, and 37/130 region).

Categories:
341 Views

This dataset contains pipe images straight, right and left curves to support AUV navigation based on image.

Categories:
642 Views

 

There exist several commonly used datasets in relation to object detection that include COCO (with multiple versions) and ImageNet containing large annotations for 80 and 1000 objects (i.e. classes) respectively. However, very limited datasets are available comprising specific objects identified by visually imapeired people (VIP) such as wheel-bins, trash-Bags, e-Scooters, advertising boards, and bollard. Furthermore, the annotations for these objects are not available in existing sources.

Categories:
227 Views

The dataset contains the navigation measurements obtained in the indoor experiment field. The volunteers move on the whole 4th floor of the Building D of Dong Jiu Teaching classes at Huazhong University of Science and Technology. Meanwhile, the experimental area consists of a total area of 717 m 2. These datasets were used and can be used to test and validate the radio map database updating-based localization positioning algorithm through the RSSI signals space.

Categories:
1384 Views

The region-based segmentation approach has been a major research area for many medical image applications. A vision guided autonomous system has used region-based segmentation information to operate heavy machinery and locomotive machines intended for computer vision applications. The dataset contains raw images in .png format fro brain tumor in various portions of brain.The dataset can be used fro training and testing. Images are calssified into three main regions as frontal lobe(level -1, level-2), optus-lobe(level-1), medula_lobe(level-1,level-2,level-3).

Categories:
10442 Views

Pen testing the method to evaluate the security of an application or network by safely exploiting any security vulnerabilities present in the system. These security flaws can be present in various areas such as system configuration settings, login methods, and even end-users risky behaviors.

Categories:
506 Views

Pages