Communications
This dataset includes the Channels Switch Sequences of 300 IPTV viewers in Guangzhou, P.R. China, in Augest, 2014. There are 4 columns in the file, which represent viewer ID, the current channel number, the next channel number, the date of the month, respectively. The first column, the ID code of a viewer, ranks in descent with the times the viewer watched tv channels. The more times a viewer watches tv channels, the bigger the ID is. In a day, the rows are time series and generated step by step as the real watching tv behavior.
- Categories:
This dataset includes the Channels Switch Sequences of 300 IPTV viewers in Guangzhou, P.R. China, in Augest, 2014.
There are 4 columns in the file, which represent viewer ID, the current channel number, th next channel number, the date of the month, respectively.
The first column, the ID code of a viewter, ranks with the times the viewer watched tv channels. The more times a viewer watches tv channels, the bigger
the ID is. In a day, the rows are time series and generated step by step as the real watching tv behavior.
- Categories:
The system obtained interference information from the measurement signal, solved the problem of phase wrapping, and got the accurate coordinates of target. The tags and tag-free items including shrimp chips, cola and instant noodles were taken as target respectively in experiment.
- Categories:
The software industry is a very flexible phenomenon. Adding network concepts to this industry means we have countless actors with different roles on a single ground. Its players include software developers, customers, users, and software components. The purpose of this article is to create a better way to communicate between these actors.We can imagine software engineering different and more effective than the current situation.
- Categories:
RSSI-Dataset
The RSSI-Dataset provides a comprehensive set of Received Signal Strength Indication (RSSI) readings from within two indoor office buildings. Four wireless technologies were used:
- Zigbee (IEEE 802.15.4),
- WiFi (IEEE 802. 11),
- Bluetooth Low Energy (BLE) and
- Long Range Area-Wide Network (LoRaWAN).
For experimentation Arduinos Raspberry Pi, XBees, Gimbal beacons Series 10 and Dragino LoRa Shield were also used.
- Categories:
Expansion of wireless body area networks (WBANs) applications such as health-care, m-banking, and others has lead to vulnerability of privacy and personal data. An effective and unobtrusive natural method of authentication is therefore a necessity in such applications. Accelerometer-based gait recognition has become an attractive solution, however, continuous sampling of accelerometer data reduces the battery life of wearables. This paper investigates the usage of received signal strength indicator (RSSI) as a source of gait recognition.
- Categories:
A large frequency interval dual-band high-gain slot array antenna based on SIW (substrate integrated waveguide) for simultaneous microwave and millimeter wave application is proposed in this paper. The designed antenna consists of 2 arrays working on 9.86 GHz ~ 10.2 GHz and 25.9 GHz ~ 39.53 GHz, which can meet demand on X- and Ka-band, respectively. Two substrates sandwiched between three layers of metal are employed, and all slots are located on the second metal layer.
- Categories:
x
- Categories:
Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victim’s encrypted network traffic in order to identify user’s parameters such as the Operating System (OS), browser and apps. The user may use tools such as a Virtual Private Network (VPN) or even change protocols parameters to protect his/her privacy.
- Categories: