Communications

Full Duplex Sensor array

Categories:
193 Views

Our Signing in the Wild dataset consists of various videos harvested from YouTube containing people signing in various sign languages and doing so in diverse settings, environments, under complex signer and camera motion, and even group signing. This dataset is intended to be used for sign language detection.

 

Categories:
732 Views

This dataset was generated on a small-scale process automation scenario using MODBUS/TCP equipment, for research on the application of ML techniques to cybersecurity in Industrial Control Systems. The testbed emulates a CPS process controlled by a SCADA system using the MODBUS/TCP protocol. It consists of a liquid pump simulated by an electric motor controlled by a variable frequency drive (allowing for multiple rotor speeds), which in its turn controlled by a Programmable Logic Controller (PLC).

Categories:
7038 Views

Device identification using network traffic analysis is being researched for IoT and non-IoT devices against cyber-attacks. The idea is to define a device specific unique fingerprint by analyzing the solely inter-arrival time (IAT) of packets as feature to identify a device. Deep learning is used on IAT signature for device fingerprinting of 58 non-IoT devices. We observed maximum recall and accuracy of 97.9% and 97.7% to identify device. A comparitive research GTID found using defined IAT signature that models of device identification are better than device type identification.

Categories:
1193 Views

None

Categories:
83 Views

Design of novel RF front-end hardware architectures and their associated measurement algorithms.
Research objectives, includes:
RO1: Novel architecture based upon Adaptive Wavelet Band-pass Sampling (AWBS) of RF Analog-to-Information Conversion (AIC).
RO2: Integration of AWBS for increasing the wideband sensing capabilities of real-time spectrum analyzers by using AICs.
RO3: Propose online calibration methods and algorithms for front-end hardware non-idealities compensation.

Categories:
267 Views

This dataset is related to the paper  "A distributed Front-end Edge node assessment method by using a learning-to-rank method"

 

Normal
0

false
false
false

EN-US
JA
AR-SA

 

Categories:
184 Views

Radio frequency identification (RFID) provides a simple and effective solution to the passive indoor localization. The conventional wisdom about RFID localization is utilizing reference tags. It performs well in tag or single passive target localization. However, in the passive multiple target scenario, reference tag based localization suffers from some limitations, including the array aperture, mutual coupling of reference tags, and coherent superimposition of target signals.

Categories:
545 Views

The dataset contains a set of voip flows (with different codecs) captured in fixed/fixed and fixed/mobile LTE-A enviroment. 

Categories:
983 Views

This dataset provides the source data for the figures and tables found in the paper "Elliptic Curve Lightweight Cryptography: a Survey."

Categories:
581 Views

Pages