We obtained 6 million instances to be used as an analysis for modelling CO2 behavior. The Data Logging and sensors nodes acquisition are every 1 second.
Research on damage detection of road surfaces has been an active area of research, but most studies have focused so far on the detection of the presence of damages. However, in real-world scenarios, road managers need to clearly understand the type of damage and its extent in order to take effective action in advance or to allocate the necessary resources. Moreover, currently there are few uniform and openly available road damage datasets, leading to a lack of a common benchmark for road damage detection.
The development of electronic nose (e-nose) for a rapid, simple, and low-cost meat assessment system becomes the concern of researchers in recent years. Hence, we provide time-series datasets that were recorded from e-nose for beef quality monitoring experiment. This dataset is originated from 12 type of beef cuts including round (shank), top sirloin, tenderloin, flap meat (flank), striploin (shortloin), brisket, clod/chuck, skirt meat (plate), inside/outside, rib eye, shin, and fat.
A reliable and comprehensive public WiFi fingerprinting database for researchers to implement and compare the indoor localization’s methods.The database contains RSSI information from 6 APs conducted in different days with the support of autonomous robot.
Database Folder name "RSSI_6AP_Experiments" which includes:
+ Nexus 4 database
+ Nexus 5 database
Training & Testing data are seperated & collected in different time with different locations.
* The general format for csv data file is:
-- X & Y & The list of RSSI
-- X | Y | RSSI Vector
This study was conducted in Mayaguez – Puerto Rico, and an area of around 18 Km2 was covered, which were determined using the following classification of places:
· Main Avenues: Wide public ways that has hospitals, vegetation, buildings, on either side
· Open Places: Mall parking lots and public plazas
· Streets & Roads: Dense residential and commercial areas on both sides
Vendor Equipment Description
KEYSIGHT® N9343C Handheld Spectrum Analyzer
***For CSV Files:
You can open the CSV files on Microsoft Excel or any other. In these files you will find the following information in different columns:
- Individually the information of each of the 20 scanned frequencies (center frequency, bandwidth, power in dBm).
***For KML Files:
You can open simply this interactive files using the Google Earth Pro software by clicking on file, open, and selecting the desired KML file.
At this point, the interactive map must be located on the place of the points and showing several colored ellipses between green for the weakest power level, and red for the strongest. If you press each point, you can see the complete information of each location.
The frequencies used in this study are shown below:
Survey Frequencies (Bandwidth 4% --> Patch Antenna)
Central Frequency (MHz) / Band Description
7200 .csv files, each containing a 10 kHz recording of a 1 ms lasting 100 hz sound, recorded centimeterwise in a 20 cm x 60 cm locating range on a table. 3600 files (3 at each of the 1200 different positions) are without an obstacle between the loudspeaker and the microphone, 3600 RIR recordings are affected by the changes of the object (a book). The OOLA is initially trained offline in batch mode by the first instance of the RIR recordings without the book. Then it learns online in an incremental mode how the RIR changes by the book.
folder 'load and preprocess offline data': matlab sourcecodes and raw/working offline (no additional obstacle) data files
folder 'lvq and kmeans test': matlab sourcecodes to test and compare in-sample failure with and without LVQ
folder 'online data load and preprocess': matlab sourcecodes and raw/working online (additional obstacle) data files
folder 'OOL': matlab sourcecodes configurable for case 1-4
folder 'OOL2': matlab sourcecodes for case 5
folder 'plots': plots and simulations
The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this challenge, realistic protection and investigation countermeasures, such as network intrusion detection and network forensic systems, need to be effectively developed. For this purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems. Although there are several network datasets, in most cases, not much information is given about the Botnet scenarios that were used.