Computational Intelligence

A real-world radio frequency (RF) fingerprinting dataset for commercial off-the-shelf (COTS) Bluetooth and WiFi emitters under challenging testbed setups is presented in this dataset. The chipsets within the devices (2 laptops and 8 commercial chips) are WiFi-Bluetooth combo transceivers. The emissions are captured with a National Instruments Ettus USRP X300 radio outfitted with a UBX160 daughterboard and a VERT2450 antenna. The receiver is tuned to record a 66.67 MHz bandwidth of the spectrum centered at the 2.414 GHz frequency.

Categories:
1567 Views

The data collection includes posts from social media networks popular among Russian-speaking people. The information was gathered using pre-defined keywords ("war," "special military operation," and so on) and is mainly relevant to Ukraine's continuing conflict with Russia. Following a thorough assessment and analysis of the data, propaganda and false news were detected. The information gathered has been anonymized. Feature engineering and text preparation can extract new insights and information from this data source.

Categories:
1909 Views

To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has entire network data at the time of several cyber attacks to enable experimentation on challenges based on implementing defense mechanisms on a larger scale. For collecting the data, we captured the network traffic of configured virtual machines using Wireshark and tcpdump.

Categories:
1785 Views

Due to the smaller size, low cost, and easy operational features, small unmanned aerial vehicles (SUAVs) have become more popular for various defense as well as civil applications. They can also give threat to national security if intentionally operated by any hostile actor(s). Since all the SUAV targets have a high degree of resemblances in their micro-Doppler (m-D) space, their accurate detection/classification can be highly guaranteed by the appropriate deep convolutional neural network (DCNN) architecture.

Categories:
1714 Views

In the view of national security, radar micro-Doppler (m-D) signatures-based recognition of suspicious human activities becomes significant. In connection to this, early detection and warning of terrorist activities at the country borders, protected/secured/guarded places and civilian violent protests is mandatory.

Categories:
3183 Views

The dataset includes active power measurements for a residential dwelling (apartment) located in Bucharest, Romania, collected at 1s second reporting rate over several months.
Always-on appliances include the refrigerator and the wireless router. Several other appliances are installed in the residential unit: washing machine, lighting fixtures, electrical iron, vacuum cleaner, various ICT charging devices, and air conditioning (seldom used).

Categories:
970 Views

China has a vast territory, and different regions have different air quality conditions. The database selects the air quality of 264 major cities in China as the research object.

Categories:
545 Views

 

It contains all the log information of customers in the shopping mall.

Categories:
332 Views

Industrial drying processes are an energy extensive and often one of the most time consuming processes in a manufacturing line. Optimizing the drying process can therefore lead to a reducing in energy consumption and an increase in manufacturing throughput.

Categories:
436 Views

<p>Numerical comparison serves as a major tool in evaluating the performance of optimization algorithms, especially nondeterministic algorithms, but existing methods may suffer from a ‘cycle ranking’ paradox and/or a ‘survival of the nonfittest paradox. This paper searches for paradox-free data analysis methods for numerical comparison. It is discovered that a class of sufficient conditions exist for designing paradox-free analysis. Rigorous modeling and deduction are applied to a class of profile methods employing a filter.

Categories:
114 Views

Pages