Communications

The dataset is used in the paper entitled "A distributed Fog node assessment model by using Fuzzy rules learned by XGBoost" as fuzzy rules extracted by XGboost

Categories:
284 Views

Our goal is to find whether a convolutional neural network (CNN) performs better than the existing blind algorithms for image denoising, and, if yes, whether the noise statistics has an effect on the performance gap. We performed automatic identification of noise distribution, over a set of nine possible distributions, namely, Gaussian, log-normal, uniform, exponential, Poisson, salt and pepper, Rayleigh, speckle and Erlang. Next, for each of these noisy image sets, we compared the performance of FFDNet, a CNN based denoising method, with noise clinic, a blind denoising algorithm.

Categories:
2783 Views

Full Duplex Sensor array

Categories:
194 Views

Our Signing in the Wild dataset consists of various videos harvested from YouTube containing people signing in various sign languages and doing so in diverse settings, environments, under complex signer and camera motion, and even group signing. This dataset is intended to be used for sign language detection.

 

Categories:
735 Views

This dataset was generated on a small-scale process automation scenario using MODBUS/TCP equipment, for research on the application of ML techniques to cybersecurity in Industrial Control Systems. The testbed emulates a CPS process controlled by a SCADA system using the MODBUS/TCP protocol. It consists of a liquid pump simulated by an electric motor controlled by a variable frequency drive (allowing for multiple rotor speeds), which in its turn controlled by a Programmable Logic Controller (PLC).

Categories:
7124 Views

Device identification using network traffic analysis is being researched for IoT and non-IoT devices against cyber-attacks. The idea is to define a device specific unique fingerprint by analyzing the solely inter-arrival time (IAT) of packets as feature to identify a device. Deep learning is used on IAT signature for device fingerprinting of 58 non-IoT devices. We observed maximum recall and accuracy of 97.9% and 97.7% to identify device. A comparitive research GTID found using defined IAT signature that models of device identification are better than device type identification.

Categories:
1206 Views

None

Categories:
84 Views

Design of novel RF front-end hardware architectures and their associated measurement algorithms.
Research objectives, includes:
RO1: Novel architecture based upon Adaptive Wavelet Band-pass Sampling (AWBS) of RF Analog-to-Information Conversion (AIC).
RO2: Integration of AWBS for increasing the wideband sensing capabilities of real-time spectrum analyzers by using AICs.
RO3: Propose online calibration methods and algorithms for front-end hardware non-idealities compensation.

Categories:
267 Views

This dataset is related to the paper  "A distributed Front-end Edge node assessment method by using a learning-to-rank method"

 

Normal
0

false
false
false

EN-US
JA
AR-SA

 

Categories:
185 Views

Radio frequency identification (RFID) provides a simple and effective solution to the passive indoor localization. The conventional wisdom about RFID localization is utilizing reference tags. It performs well in tag or single passive target localization. However, in the passive multiple target scenario, reference tag based localization suffers from some limitations, including the array aperture, mutual coupling of reference tags, and coherent superimposition of target signals.

Categories:
549 Views

Pages